MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5b15b1fd3bf2eef911358d7125b5120eb716dcd75af883cd133dc0e346988c85. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FormBook
Vendor detections: 4
| SHA256 hash: | 5b15b1fd3bf2eef911358d7125b5120eb716dcd75af883cd133dc0e346988c85 |
|---|---|
| SHA3-384 hash: | e0f06851f6583447ebcbf3b1bedae98626f5223cfc165e87034990b849926290fce4c638fc150a07a9c62367bc4d3f91 |
| SHA1 hash: | cc271db98fc74f0cf3ee8508b3b546522876cdc5 |
| MD5 hash: | 2e9388fa93aa73819d8fc600611cc73c |
| humanhash: | tennis-glucose-fish-ten |
| File name: | PO_May.exe |
| Download: | download sample |
| Signature | FormBook |
| File size: | 957'328 bytes |
| First seen: | 2020-05-02 17:08:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f00d8dcb202a28bfc47f99ef51cb4107 (3 x FormBook) |
| ssdeep | 12288:4YOUBBN/eZZe7M138vlLtfTpOOPBebQubsRPuUcsl6k4/yypwD6FoEwc:r58ZCM138v9rTJebvb55xk2pwD6FoEwc |
| Threatray | 5'293 similar samples on MalwareBazaar |
| TLSH | AA159FC5F14888DBE93B19B3983BA63050467DED90F1811E729E772955B338210BFE6E |
| Reporter | |
| Tags: | exe FormBook |
Code Signing Certificate
| Organisation: | VeriSign Time Stamping Services Signer - G2 |
|---|---|
| Issuer: | VeriSign Time Stamping Services CA |
| Algorithm: | sha1WithRSAEncryption |
| Valid from: | Jun 15 00:00:00 2007 GMT |
| Valid to: | Jun 14 23:59:59 2012 GMT |
| Serial number: | 3825D7FAF861AF9EF490E726B5D65AD5 |
| Intelligence: | 44 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 8815DFF787F21FA8106760CB89C5B4493F4BD45E2CE801D2A4FE1F61DEE0C039 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
abuse_ch
Malspam distributing FormBook:HELO: cathay-food.co
Sending IP: 111.90.140.123
From: Kelvin <info@sprengelmeijer.nl>
Reply-To: piusequip20@protonmail.com
Subject: FW: we need supplies urgently
Attachment: PO_May.zip (contains "PO_May.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-02 17:35:25 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
26 of 31 (83.87%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
trickbot
emotet
Similar samples:
+ 5'283 additional samples on MalwareBazaar
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.