MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 186ced16f9513049939b723225f7d4c61180a9dbbcb31c739b630a45c465b565. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 186ced16f9513049939b723225f7d4c61180a9dbbcb31c739b630a45c465b565
SHA3-384 hash: 51b8ad593a56d70bb2ca5f532e5ed2d346df140bebf95cd6b355a544a5d47fb7724d5d98e4ad858c0a021171ab8e5af7
SHA1 hash: 40864a9695ec4849b586480ebf995e0c3fe2a28c
MD5 hash: e6f1947395d8da6f326c569864dea60a
humanhash: hot-mexico-march-single
File name:Case No 201605644-45 A2.exe
Download: download sample
File size:436'736 bytes
First seen:2020-05-12 16:19:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:nOopQks+DVtIV7XOmFC1b2jYb93iJFZ47/S2G+0oxOik1bKGu6XFCvTtHxd/nRYf:OoNs+DgVRFCQjYb93F/S2CoxmRo7m
Threatray 5'168 similar samples on MalwareBazaar
TLSH E294B01CB7AC7C17FABD17FAD06541C9D2FDD6A78406F34A984218E90E0B3D699132CA
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: k001.k001jp9293.info
Sending IP: 153.127.33.181
From: Supreme Court <e-filingsupport@supremecourt.gov>
Subject: Case No: 201605644-45 A2
Attachment: Case No 201605644-45 A2.img (contains "Case No 201605644-45 A2.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-12 04:07:40 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Maps connected drives based on registry
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.porcber.com/mq3/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 186ced16f9513049939b723225f7d4c61180a9dbbcb31c739b630a45c465b565

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments