MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2e7eb3731b0cef688c638e8f3582bdad26bb5e07b151c1a79b77d55a3b91d8fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 5 File information Comments

SHA256 hash: 2e7eb3731b0cef688c638e8f3582bdad26bb5e07b151c1a79b77d55a3b91d8fc
SHA3-384 hash: 42e0575fda32e0a00ea3c232498e2e013a7e470f29ae418cde475615c90de78a592f2ff743d3765606da5658f0ae9408
SHA1 hash: b67391755b7586f608f0d4d49435f106ea5b33e4
MD5 hash: d3e7f19bdac08fd96b648d4b76316898
humanhash: ack-floor-fanta-victor
File name:Request for proforma Invoice-PO-1272412662. PN2023-W101.rar
Download: download sample
Signature Formbook
File size:993'357 bytes
First seen:2024-09-25 06:32:57 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:nU+Q7KyXetOyPOm7Dl65TohOfA6JhLvNJH1wmZa5Cnp8fy:nU19kOmAuOfAud/ViCn+fy
TLSH T120253381D3F27A32CBD9464FE06F691859FB93784A8428D907721FB794E43D9871F0A8
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:FormBook INVOICE rar


Avatar
cocaman
Malicious email (T1566.001)
From: "contact@0smthome.com" (likely spoofed)
Received: "from vps095.zmr.serverion.com (0smthome.com [185.28.39.119]) "
Date: "Tue, 24 Sep 2024 04:42:10 +0100"
Subject: "RE: Request for proforma Invoice-PO-12724/12662. PN2023-W101"
Attachment: "Request for proforma Invoice-PO-1272412662. PN2023-W101.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Request for proforma Invoice-PO-1272412662. PN2023-W101.exe
File size:1'353'045 bytes
SHA256 hash: 8553e38f8a5e79e86ca123bf8d8f36a295fb43364877b9f58634d66b84afd8a2
MD5 hash: 9ed38493a140c21adfeef3b5d9fd7b6e
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
Encryption Swotter Shellcode Emotet Autoit Packer
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Zmutzy
Status:
Malicious
First seen:
2024-09-25 06:33:09 UTC
File Type:
Binary (Archive)
Extracted files:
29
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIt
Author:Jean-Philippe Teissier / @Jipe_
Description:AutoIT packer
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar 2e7eb3731b0cef688c638e8f3582bdad26bb5e07b151c1a79b77d55a3b91d8fc

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments