MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence 2 File information 4 Yara 3 Comments

SHA256 hash: cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49
SHA3-384 hash: 2f7799cd534239cd07f2bedee83df6e425d5356f34153ac815e30e36b835c127809e16261e326e35f4634affaa5b1c16
SHA1 hash: fb32e85f940945c6c0d3052b80f48f5bc48f7c7d
MD5 hash: 4cd3bc98fa3df22248c7e5d63dbe1168
humanhash: alaska-carpet-queen-jersey
File name:PO389732.exe
Download: download sample
Signature Formbook
File size:333'312 bytes
First seen:2020-06-30 05:22:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:psx/Lx562xu65MKNoGnHT41DZ8LaMfXF9WrVrcPLevs:psx/d5VX5ZNn4L8L1fPqVs
TLSH FA64E138321FAC3BC66805F94591965843B5ACB93643F3D9DCC972E806FABEC4B01967
Reporter @abuse_ch
Tags:exe FormBook


Twitter
@abuse_ch
Malspam distributing Formbook:

HELO: regular1.263xmail.com
Sending IP: 211.150.70.202
From: Leona <admin@yingshitech.com>
Subject: Re:new order
Attachment: PO389732.zip (contains "PO389732.exe")

Intelligence


Mail intelligence
Trap location Impact
Global Low
# of uploads 1
# of downloads 33
Origin country US US
CAPE Sandbox Detection:Formbook
Link: https://www.capesandbox.com/analysis/16759/
ClamAV SecuriteInfo.com.MSIL.Kryptik.VFR-1.UNOFFICIAL
CERT.PL MWDB Detection:formbook
Link: https://mwdb.cert.pl/sample/cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49/
ReversingLabs :Status:Malicious
Threat name:ByteCode-MSIL.Trojan.Kryptik
First seen:2020-06-30 05:23:06 UTC
AV detection:25 of 31 (80.65%)
Threat level:   5/5
Spamhaus Hash Blocklist :Malicious file
Hatching Triage Score:   10/10
Malware Family:formbook
Link: https://tria.ge/reports/200630-148ktflbpx/
Tags:spyware persistence trojan stealer family:formbook
VirusTotal:Virustotal results 26.39%

Yara Signatures


Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_formbook_g0
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments