MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 adf4b8a00eec7af49d20ac1939ca9b5c078e8d119c7e6f1b708c5e39df3acf71. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: adf4b8a00eec7af49d20ac1939ca9b5c078e8d119c7e6f1b708c5e39df3acf71
SHA3-384 hash: 3b35ad6db7953ada91d7875cce5e76807c7d2cc2db08845bbdc5d270d7981e0517f388048f7c47202a51d84c03797054
SHA1 hash: 9736f277710815dafe27857805e0c7af97adfaeb
MD5 hash: 04c8a35797fa8d2e1e3ed5f65f128d04
humanhash: crazy-eighteen-march-saturn
File name:Total GP Employment Offer.exe
Download: download sample
Signature FormBook
File size:317'952 bytes
First seen:2020-06-14 10:36:00 UTC
Last seen:2020-06-14 11:42:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:d2irdS0Hsu1Ptr2yvU1OFBvFn5FzD6rZ2WCsd15WaiKDks:WIPr2mU1OFBvFn3PvWF18vH
Threatray 5'105 similar samples on MalwareBazaar
TLSH 3064F10873ACAF26DAFA47F98AE2284413B495775521F74E5EC431EE1E33F858602E17
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: smtpauth.net4india.com
Sending IP: 202.71.131.66
From: Total GP HR Department<hr@totalgp.com>
Subject: Total GP Employment Offer
Attachment: Total GP Employment Offer.zip (contains "Total GP Employment Offer.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Swotter
Status:
Malicious
First seen:
2020-06-14 01:21:22 UTC
AV detection:
25 of 48 (52.08%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat rezer0 spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Gathers network information
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
rezer0
Formbook
Malware Config
C2 Extraction:
http://www.vinoblay.com/lgm/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe adf4b8a00eec7af49d20ac1939ca9b5c078e8d119c7e6f1b708c5e39df3acf71

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments