MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1bf9db8285719827160844a6a51292c30346c3099a4753c92177cba4e59b2404. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: 1bf9db8285719827160844a6a51292c30346c3099a4753c92177cba4e59b2404
SHA3-384 hash: be13fd0a8ddcfbe2f911f6706fbefa235ba9b017b92d803aaede0ea9cd5811ecbdecbd0bd5df57535da611ba9612e7af
SHA1 hash: 79437779f16915a20a5a38a768242427eed08401
MD5 hash: 1d2585eb104895bd6a4059cee636cee7
humanhash: virginia-bravo-six-island
File name:LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe
Download: download sample
Signature Formbook
File size:355'328 bytes
First seen:2020-06-30 05:55:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:tg8RLx5BoUm3uqKBTxHb+a6r4s1injtKncss3K7nT9PiGrTReq7UGYddptTXRm:tg8Rd5B7meFB5qvrninhSc332T9aGrTd
TLSH 1474F124725F6837CEBC05F58092968083B9A4F63553F3E68DCD21E817D6BEC4A42B67
Reporter @abuse_ch
Tags:exe FormBook


Twitter
@abuse_ch
Malspam distributing Formbook:

HELO: mtk0.zmsyd.com
Sending IP: 45.95.171.11
From: PROCUREMENT MANAGER <p.m@zmsyd.com>
Subject: QUOTATION ON THE PRODUCTS ATTACHED
Attachment: LIST OF PRODUCTS AND SPECIFICATIONS.bat.rar (contains "LIST OF PRODUCTS AND SPECIFICATIONS.bat.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
38
Origin country :
US US
Mail intelligence
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-30 05:57:05 UTC
AV detection:
23 of 31 (74.19%)
Threat level
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
evasion trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Deletes itself

Yara Signatures


Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_formbook_g0
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 1bf9db8285719827160844a6a51292c30346c3099a4753c92177cba4e59b2404

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments