MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 33540c87b4a370480b1c9d2961148c88edd7289107970105300ee9497f6b0cfd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 5
| SHA256 hash: | 33540c87b4a370480b1c9d2961148c88edd7289107970105300ee9497f6b0cfd |
|---|---|
| SHA3-384 hash: | aceac920a883a77dd15d621e51d5cb2a1d52c7d62ceb0cd0c6949f23794c0f68259b123908563d294444d5bc4018c157 |
| SHA1 hash: | 36c1108df81c5a77fb5a6122fde9ed6547456784 |
| MD5 hash: | fb3e44ead09ac81d65413dd918b01fac |
| humanhash: | seventeen-spring-blossom-lithium |
| File name: | Zahlung SWIft pdf.zip |
| Download: | download sample |
| Signature | Formbook |
| File size: | 590'234 bytes |
| First seen: | 2021-04-23 15:41:08 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:RiMW089pxGBibR3J2sqvDez3JVi4NH3xg8dGR9k7q1q21gbcLXxOIKD/Y:s0epxJ5QZvDez3Xi4lhdik7qta88IyA |
| TLSH | 22C42363ED9DF5382739DA7CE60C5E43C719429A1680694FA39FE2B0BE1027B142B7D4 |
| Reporter | |
| Tags: | FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-23 15:42:10 UTC
AV detection:
13 of 47 (27.66%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.ostecosarcomamd.com/gmn/
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.35
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Dropped by
Formbook
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.