MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 26fe61ca673b99be823d74c29a2d414b6198d40d9bacc08411f3d7fa548186ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 26fe61ca673b99be823d74c29a2d414b6198d40d9bacc08411f3d7fa548186ec
SHA3-384 hash: 1348a9e9081e18f32f52ce02ea1b7f8a16971301317f3e70e4bf25a6e08f3d4598fbd62a190642d1d1a158acbd8732a5
SHA1 hash: a569639673f73565ee6b06a8e39761e2eff820df
MD5 hash: 0844ebc5c80331bf9d7e7ba862497532
humanhash: arizona-purple-georgia-kentucky
File name:DHL Shipping Document.rar
Download: download sample
Signature Formbook
File size:559'640 bytes
First seen:2023-02-16 13:01:50 UTC
Last seen:2023-05-18 13:51:13 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:oWyPWCsFqJrr0bV7I4gZReHON0ps+Ix8HzPatcqFNB+vkaWCvp3bxEHY5:oICsFqJCV71g3/+w8HNc7+vkaWCRUY5
TLSH T14AC4235F8C6821EB779A6A9030ED87D0BFA6C85B0CDB66D0302D414B85768DFDD9839C
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:DHL FormBook INVOICE rar Shipping zip


Avatar
cocaman
Malicious email (T1566.001)
From: "DHL EXPRESS<worldwide@dhl.com>" (likely spoofed)
Received: "from crxtupfo.lovethatpooch.com (crxtupfo.lovethatpooch.com [92.52.217.102]) "
Date: "16 Feb 2023 15:01:02 +0200"
Subject: "DHL Shipping Document/Invoice Receipt"
Attachment: "DHL Shipping Document.rar"

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:UoiRTdCpIfgMI8G.exe
File size:742'912 bytes
SHA256 hash: 25f2b36dc8b2fb7c4d2694c9d4293de356f39d61732414be8b87e772aadcb30d
MD5 hash: aa6ea90191a6020cd3c2e17add3dd7fc
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2023-02-16 13:01:55 UTC
File Type:
Binary (Archive)
Extracted files:
16
AV detection:
10 of 25 (40.00%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:oe26 rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 26fe61ca673b99be823d74c29a2d414b6198d40d9bacc08411f3d7fa548186ec

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments