MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 76333652b5c82499dde362e8892ff2316a455ee5118f6127d6462ec3654cd544. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 76333652b5c82499dde362e8892ff2316a455ee5118f6127d6462ec3654cd544
SHA3-384 hash: 4973d381cfcadb6d50a30d267c224c106d672e1469efcf60ce2c0ee1e7ae57ddc2d9389fe9ae24b6bde1a87797ff7c33
SHA1 hash: 7bf0e474712848aeeb7baa1ac5d12137d39a96d2
MD5 hash: ce782e48af863ce626b3100648b9bb13
humanhash: triple-speaker-four-sierra
File name:INVOICE QUOTATION.exe
Download: download sample
File size:448'512 bytes
First seen:2020-05-13 10:07:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:xK9ITvJ6BoBWyogukpIBpy9CpGVmOWADsYLGQO+/LPoQi3tIiWmzbHJFd:xEwvJPFopkpKpy9CpGVmOuQtk+iWovd
Threatray 6'734 similar samples on MalwareBazaar
TLSH 3C949D17EBB6ED3BD3F871FB400434040EAD5D924EE2F68A6898B195FDB3B82C441596
Reporter abuse_ch
Tags:exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: colorntouch.co
Sending IP: 111.90.141.162
From: Lily Tran Zulueta <purchasing@majuuniversal.com>
Reply-To: intertradeemito@gmail.com
Subject: REQUEST FOR QUOTATION - PR-S/P-100789
Attachment: INVOICE QUOTATION.rar (contains "INVOICE QUOTATION.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-13 10:36:48 UTC
File Type:
PE (.Net Exe)
Extracted files:
48
AV detection:
24 of 31 (77.42%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan persistence
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
Suspicious use of UnmapMainImage
Drops file in Program Files directory
Suspicious use of SetThreadContext
Deletes itself
Reads user/profile data of web browsers
Adds policy Run key to start application
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.howndey.com/xd4/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Executable exe 76333652b5c82499dde362e8892ff2316a455ee5118f6127d6462ec3654cd544

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments