MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 34dd97e81d14520141d4356c71cafd8c3e140a0b3620d14f8ed76629f35b0a2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 6
| SHA256 hash: | 34dd97e81d14520141d4356c71cafd8c3e140a0b3620d14f8ed76629f35b0a2d |
|---|---|
| SHA3-384 hash: | 022f54a2d2c98193d01895cd8e7b9593210e30cde3c161696cb1d00d2b8a168ff7195d30f99046de0d33a675cda47b43 |
| SHA1 hash: | b32c7836a9d38f8329e9c3e8dbddfb924b639130 |
| MD5 hash: | 3c8441920add2b383a9e2e9b65776730 |
| humanhash: | social-apart-oklahoma-network |
| File name: | Request For Quotation_ PO5981.zip |
| Download: | download sample |
| Signature | Formbook |
| File size: | 718'464 bytes |
| First seen: | 2022-08-17 11:46:56 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 12288:Q8IdeCx93Gt3N01UyPAslHA9XsOJ//TssqLpLq54RKHkXpLfCSk2Yq/bEHDKck:QPdZx93GHTs1a8K/TqLJg4gEXpLfCq84 |
| TLSH | T179E4334CF5A2D09D4DE8BC07FD9A5242C97606AB78D5F8F5F44AB13E87301A243E8971 |
| TrID | 80.0% (.ZIP) ZIP compressed archive (4000/1) 20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1) |
| Reporter | |
| Tags: | FormBook QUOTATION zip |
cocaman
Malicious email (T1566.001)From: "=?UTF-8?B?IlBldHIgTW9sw6HEjWVrIg==?= <Manjunath.Rao@auma.com>" (likely spoofed)
Received: "from mageneet.com (unknown [109.206.241.106]) "
Date: "16 Aug 2022 10:37:42 -0700"
Subject: "Re: Request For Quotation_ PO5980"
Attachment: "Request For Quotation_ PO5981.zip"
Intelligence
File Origin
# of uploads :
1
# of downloads :
193
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2022-08-15 00:41:30 UTC
File Type:
Binary (Archive)
Extracted files:
21
AV detection:
16 of 26 (61.54%)
Threat level:
5/5
Detection(s):
Malicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
spyware stealer
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks computer location settings
Reads user/profile data of web browsers
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.68
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Dropping
Formbook
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.