MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1297a6593f2b224a66e882bcc5af02af802012cef77bd244cf14c73f5c76534c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 1297a6593f2b224a66e882bcc5af02af802012cef77bd244cf14c73f5c76534c
SHA3-384 hash: 3db41b737f3eef0cd287749e000f2a5b6e8e2005f7e5a285be01add16e5734285fdec9520dc52cbc919580680f11fd57
SHA1 hash: 46c412eed19358a5f6f7683a7acd90d4d18ae949
MD5 hash: 667325a247e436115f53b94fd3373608
humanhash: apart-lemon-iowa-black
File name:(DHL) Shipment Import DutyTax Payment Alert.ace
Download: download sample
Signature Formbook
File size:715'963 bytes
First seen:2021-05-31 08:42:39 UTC
Last seen:2021-05-31 19:49:20 UTC
File type: ace
MIME type:application/octet-stream
ssdeep 12288:Fsq/lLOQsg9BJ3PK2aUMECK9wY5vkAMSc30Sr4vbmk9p06Y1twgdazr79G/hNZ5:Fsq/QQp9BpPNHMEJOY5vkA3ysvbr06iz
TLSH 0CE423633A309BF514607D9529CFE617AD13E2A18D38292C990F2647588323F47C9EFB
Reporter cocaman
Tags:ace DHL FormBook


Avatar
cocaman
Malicious email (T1566.001)
From: "shipping@DHL.com" (likely spoofed)
Received: "from [103.125.189.175] (unknown [103.125.189.175]) "
Date: "31 May 2021 12:14:59 -0700"
Subject: "Re: Import / Pre-Arrival Notification / DHL Track No 781226753652 "
Attachment: "(DHL) Shipment Import DutyTax Payment Alert.ace"

Intelligence


File Origin
# of uploads :
2
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
ByteCode-MSIL.Infostealer.Fareit
Status:
Malicious
First seen:
2021-05-31 08:43:11 UTC
File Type:
Binary (Archive)
Extracted files:
17
AV detection:
8 of 47 (17.02%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.semenovdmitriik.club/bwk/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

ace 1297a6593f2b224a66e882bcc5af02af802012cef77bd244cf14c73f5c76534c

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments