MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 038776e268d370709b2cec95afcb3cf619c53629b4e22fe4a2849e8b911767ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 038776e268d370709b2cec95afcb3cf619c53629b4e22fe4a2849e8b911767ec
SHA3-384 hash: e5d554edfb0c8ddccba6aed04d696ee5fd0ca26f5cbe6c2dacf4fb62897670aa4a8013e47ebbc115231ea84f519ec9b8
SHA1 hash: 2737171206d1e34309a0763ce2b841de12d16b9b
MD5 hash: 206fabc8f333c4a5deee1da0ac062c4d
humanhash: papa-hydrogen-hot-emma
File name:2Debit Note_OwnersInvoices.zip
Download: download sample
Signature Formbook
File size:575'487 bytes
First seen:2021-02-01 09:37:28 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:S1+ksH3BYkdMK5EFD0fInU1jCd2FHjQlXfmQqIfLGQYqjd:wHsX+LK5EFQfIU42FHjQlnzGQYqx
TLSH 16C423F3DF0E55711DB24C3A18BA20EC3E7A69732DC8C604E463B26A6339191BDD9167
Reporter cocaman
Tags:FormBook zip


Avatar
cocaman
Malicious email (T1566.001)
From: "CINDY HUANG <echoelec@seed.net.tw>" (likely spoofed)
Received: "from h5.prohosting.com.ua (h5.prohosting.com.ua [91.207.44.3]) "
Date: "Mon, 01 Feb 2021 08:10:51 +0200"
Subject: "RE: Outstanding DEBIT NOTE / OWNERS MATTER 21"
Attachment: "2Debit Note_OwnersInvoices.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-02-01 09:38:08 UTC
File Type:
Binary (Archive)
Extracted files:
12
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 038776e268d370709b2cec95afcb3cf619c53629b4e22fe4a2849e8b911767ec

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments