MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 46d500e1f512e941b4c282d92908fb244439bede7a604381f761823d66f8ba2f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FormBook
Vendor detections: 6
| SHA256 hash: | 46d500e1f512e941b4c282d92908fb244439bede7a604381f761823d66f8ba2f |
|---|---|
| SHA3-384 hash: | 9834a08ad56f385357133b6faebb32467df7e5a318fbf763b07d1c4aad59e19eb43c350604d6428a107d1b0fa3ab0bbd |
| SHA1 hash: | 52d41bb1a8f072bcf33661b4bff9a0c73aa01cd0 |
| MD5 hash: | 78ec03c876afc9c1e4926e21d101d90a |
| humanhash: | eleven-stairway-sierra-carpet |
| File name: | CAacA4cjQPS0oyJ.exe |
| Download: | download sample |
| Signature | FormBook |
| File size: | 328'704 bytes |
| First seen: | 2020-06-17 06:00:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:6gIt3uLze8RarNt7VhW9yTdBO77+Xbcf5n0GvNQzlTQ:6gmuLvarjDWUWCghu |
| Threatray | 5'330 similar samples on MalwareBazaar |
| TLSH | 5764F10ABAECD315C168AB37C4DB045403B9AED32A52E35B7FC8335D1A427E6490679F |
| Reporter | |
| Tags: | exe FormBook |
abuse_ch
Malspam distributing FormBook:HELO: galileocambodia.com
Sending IP: 107.174.142.107
From: . Alisa Yuan <orion@galileocambodia.com>
Subject: 回复报价 BDMC 2020
Attachment: Quote.Gz (contains "CAacA4cjQPS0oyJ.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Detection(s):
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-17 05:20:07 UTC
AV detection:
25 of 31 (80.65%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 5'320 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
trojan spyware stealer family:formbook persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
System policy modification
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Drops file in Program Files directory
Suspicious use of SetThreadContext
Deletes itself
Reads user/profile data of web browsers
Adds Run entry to policy start application
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.