MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0e920df84ede899f1515c43ff1834c16711571aa1152f7aabb93902517203eeb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 0e920df84ede899f1515c43ff1834c16711571aa1152f7aabb93902517203eeb
SHA3-384 hash: 06fa8ea24134eff39e2f21a1927df773aa78334118e8977f961fe752f3c3b838985c6d481547cfcebefbff68ec09aec5
SHA1 hash: c09c3f74ace519af609b06c4677472aad4562f3f
MD5 hash: 2b706ba1a18b1855b0978f2576c7fdec
humanhash: violet-stairway-october-magazine
File name:March Order 2021.zip
Download: download sample
Signature Formbook
File size:780'605 bytes
First seen:2021-03-03 07:32:12 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:0N6o25O5j5Y2YtBObn1YOi59gkHE83SqMHfk4E6bvl5LnNKdAESjvUlLRaNV3aKo:0NM85dYtjG1YDDnXMHc4vbvzLGAESj2l
TLSH C7F43350BA6E9C0142B5D54CD392B1E59EFB8C4B77368A91102E006E7B34FA95F0D8FB
Reporter abuse_ch
Tags:zip


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: comercialrc.cam
Sending IP: 111.90.145.74
From: Donia Tarek <Donia.tarek@falconfg.com>
Reply-To: mzahar04@protonmail.com
Subject: FW: March Order 2021
Attachment: March Order 2021.zip (contains "March Order 2021.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-03 07:33:28 UTC
AV detection:
11 of 47 (23.40%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 0e920df84ede899f1515c43ff1834c16711571aa1152f7aabb93902517203eeb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments