MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3697fc0b34e169667f1f2f4f2ab3fc8685908d3328b2f6f813336d324c73b929. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 3697fc0b34e169667f1f2f4f2ab3fc8685908d3328b2f6f813336d324c73b929
SHA3-384 hash: 9ecb225c61026f652f60b454881fa8ed0a8afd4c478eb7d70556914cd9f8cbe0b5db18820dc9756537fe3aded060f6f6
SHA1 hash: 6b9d1064816b55e73a78f4cb7308e117d8fa0182
MD5 hash: bd2938553c3cd1d5e8db81cd0415b2be
humanhash: mirror-twenty-enemy-spaghetti
File name:PAYMENT DETAILS COPY.ace
Download: download sample
Signature Formbook
File size:602'268 bytes
First seen:2022-06-06 13:25:37 UTC
Last seen:Never
File type: ace
MIME type:application/x-rar
ssdeep 12288:nrtP41HbtpABSSuLTyRYAMwDwf8C7jX8JOR8PXfDT8MS0g3P1ss8:nhP4lbtv5yRBxDwf8C7wJORaXfDIt18
TLSH T17BD423E539B4D06E02D4DE0CAF695B80DFEFB3FAB9918452327D6454C2293D07A2588F
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:ace FormBook payment


Avatar
cocaman
Malicious email (T1566.001)
From: "TaeOan Kim <taeoankim@naver.com>" (likely spoofed)
Received: "from naver.com (unknown [103.167.92.238]) "
Date: "6 Jun 2022 04:03:08 -0700"
Subject: "FWD: PAYMENT DETAILS COPY"
Attachment: "PAYMENT DETAILS COPY.ace"

Intelligence


File Origin
# of uploads :
1
# of downloads :
282
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2022-06-06 10:43:28 UTC
File Type:
Binary (Archive)
Extracted files:
12
AV detection:
18 of 41 (43.90%)
Threat level:
  2/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:few9 loader rat spyware stealer suricata
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Reads user/profile data of web browsers
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

ace 3697fc0b34e169667f1f2f4f2ab3fc8685908d3328b2f6f813336d324c73b929

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments