MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 172be7bb49ca26c5c67465ac2581d08f6301ffccf25fd319e3bc408db5c8a4d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: 172be7bb49ca26c5c67465ac2581d08f6301ffccf25fd319e3bc408db5c8a4d3
SHA3-384 hash: ea6c67d0fd8d78e5d0940330b85337e597329a383dcb6e3bfc32754341c54e4f0b8fc630487cf081aaf1d917f0ab033f
SHA1 hash: 4137b1a66c92dd0db5d1458d0fb8d3a048147663
MD5 hash: e961d77e00c45f04a0d35f0568556432
humanhash: ack-magnesium-early-neptune
File name:Shipment Document BL,INV and Packing list Attached.exe
Download: download sample
Signature FormBook
File size:342'016 bytes
First seen:2020-06-30 01:46:40 UTC
Last seen:2020-06-30 13:36:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:m/tv2x56MLmJ0NomGW7dRFwn9jRJ6IlEtfoDTHYNTxZv0GcNqkCiU:m2dLxGGdRFwn99JzlQgn4NFCS
TLSH F374F168737C6D3FCEBC09F99483624843B585B63842F6D68CC570EA68DBBE91903917
Reporter @jarumlus
Tags:FormBook

Intelligence


File Origin
# of uploads :
3
# of downloads :
35
Origin country :
US US
Mail intelligence
Geo location:
CH Switzerland
Volume:
Low
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-29 19:53:09 UTC
AV detection:
27 of 31 (87.10%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
evasion trojan
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Enumerates system info in registry
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Deletes itself

Yara Signatures


Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_formbook_g0
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 172be7bb49ca26c5c67465ac2581d08f6301ffccf25fd319e3bc408db5c8a4d3

(this sample)

  
Dropped by
FormBook
  
Delivery method
Distributed via e-mail attachment

Comments