MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f3cf19b51263af0e6b7e8856a7d635a44dd101e069b84f5ceb11778a81cbf35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 6f3cf19b51263af0e6b7e8856a7d635a44dd101e069b84f5ceb11778a81cbf35
SHA3-384 hash: 7c326718c717bb75329a6a990418129933294dcbc2f08b0f927df9d65175ccdf111f08d4aaea9a2e66de7ecc99418dd4
SHA1 hash: 128f771b758c032983c8bbbda33a23c27f8e2e56
MD5 hash: abae3f1b96b407b71b01ce7d4481ad93
humanhash: mars-batman-lithium-cup
File name:Invoice (5).exe
Download: download sample
Signature FormBook
File size:343'040 bytes
First seen:2020-05-27 08:50:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5fd94ccd1dec1c5baf6be7519f2d9282 (8 x Formbook)
ssdeep 6144:EkJSjYID1dX2FJMNJJbZQ3c0riv5Q5Dp/ITGj6aYYvUgXDzdkD:3JYtbmqJJ6M+y5yDFITGj6a/3zzdkD
Threatray 4'915 similar samples on MalwareBazaar
TLSH 7C74BE22BA29053CC93F507879C7CDAACEE75A9364AF9C9AD99CD540C82D7C04C63277
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: postal.zeregabertrading.info
Sending IP: 176.107.177.184
From: edward@zeregabertrading.info
Subject: ORDER27062020
Attachment: PO27062020.rar (contains "Invoice (5).exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-27 00:40:41 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
24 of 48 (50.00%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of UnmapMainImage
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.mansiobok.info/ch09/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 6f3cf19b51263af0e6b7e8856a7d635a44dd101e069b84f5ceb11778a81cbf35

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments