MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 43f34b37f483bf74316fe20d67e87c05eb51415ae2ca6ebaa6e8b38f126e380a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 6 File information Comments

SHA256 hash: 43f34b37f483bf74316fe20d67e87c05eb51415ae2ca6ebaa6e8b38f126e380a
SHA3-384 hash: de1cc1f69933f7e7579b03f2445169fa2ef93741b8b612d19ecc2771cdbaacd1c7ba06eb49a1aa3b66cb8aef7261308d
SHA1 hash: 33690800178a8e15c2e196d75400252f1c657fb1
MD5 hash: da6afe9e5470df8ace606497a9ea3061
humanhash: kentucky-five-high-eighteen
File name:Purchase-Order.pdf.z
Download: download sample
Signature Formbook
File size:792'661 bytes
First seen:2024-08-03 12:03:55 UTC
Last seen:Never
File type: z
MIME type:application/x-rar
ssdeep 12288:mongiNUIR17SZf40VisHEdC8b+exO59xb6g30RvuSqY844Ft5tWD5Weui4qM3/P+:mOII2ZXoeEUw+8OxyRCt+534L/8VlkGf
TLSH T16BF43321B344DCA2FEB55AEBB37FFF241A91798562377AA1C6450C7D0C062B09CC86E5
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook z


Avatar
cocaman
Malicious email (T1566.001)
From: "Purchase manager <management@chelsom.co.uk>" (likely spoofed)
Received: "from chelsom.co.uk (unknown [192.227.144.47]) "
Date: "3 Aug 2024 04:33:54 +0200"
Subject: "Purchase Order PO0001277 - N34 PAX SUITES SO0002124"
Attachment: "Purchase-Order.pdf.z"

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Purchase-Order.exe
File size:1'319'936 bytes
SHA256 hash: 24442a381dd7b787104241b7e26d1377053a607ea042fe1a3dedbe608f25c4b6
MD5 hash: b5db60dc4611fa67d96e0fa5d1b07508
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
Shellcodecrypter
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2024-08-03 08:04:51 UTC
File Type:
Binary (Archive)
Extracted files:
29
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:pe_detect_tls_callbacks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

z 43f34b37f483bf74316fe20d67e87c05eb51415ae2ca6ebaa6e8b38f126e380a

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments