MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47a8e5c27218e4ec11d4fb2f16d993c2c84a686407d417ed023199149e465d59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 12 File information Comments

SHA256 hash: 47a8e5c27218e4ec11d4fb2f16d993c2c84a686407d417ed023199149e465d59
SHA3-384 hash: 8cba8d0f3e5ff3fe111f8a0341362f519d6b31630227b459f4f35a54e65b09a9d7ffca17b73da51ddde546cb5a1adb4d
SHA1 hash: e4f4ebf7d25a30ae18098f1adbc67b522d5335ea
MD5 hash: a66f13bf9dab0bab6a3446e1a80f48fb
humanhash: oxygen-mobile-oregon-illinois
File name:TT copt mt103.pdf.r00
Download: download sample
Signature Formbook
File size:741'072 bytes
First seen:2025-01-01 21:51:32 UTC
Last seen:2025-01-02 09:11:18 UTC
File type: r00
MIME type:application/x-rar
ssdeep 12288:j7EM79NMvXv1D6ZI/cs+3YCCdtkICVqXTwq8npftMSHnQvyL0CBFmZ3W21oQv:8MAND66+3w1XTmpfGSHiw0umWQoQv
TLSH T1A2F4339D730994C1DDBE789B8A8B132CEA317079A83F610F99880FD054F578A85BE5C3
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:FormBook r00


Avatar
cocaman
Malicious email (T1566.001)
From: "ACCOUNTS RECEIVABLES <ar.bnbmhwlae@gmail.com>" (likely spoofed)
Received: "from gmail.com (unknown [185.222.58.78]) "
Date: "16 Dec 2024 21:58:21 -0800"
Subject: "FW: TT details for confirmation"
Attachment: "TT copt mt103.pdf.r00"

Intelligence


File Origin
# of uploads :
2
# of downloads :
131
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:TT copt mt103.pdf.exe
File size:1'267'712 bytes
SHA256 hash: 9bd03d5adeab12d68f22e7f8967b8b49c8b17c933eead9bda7929ca71a3ec051
MD5 hash: c10d464c3c3cffc66e7d9473d6c0489e
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
underscore autorun autoit emotet
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2024-12-17 06:12:54 UTC
File Type:
Binary (Archive)
Extracted files:
24
AV detection:
21 of 38 (55.26%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:golang_david_CSC846
Author:David
Description:CSC-846 Golang
Rule name:pe_detect_tls_callbacks
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:SUSP_RAR_with_PDF_Script_Obfuscation
Author:Florian Roth (Nextron Systems)
Description:Detects RAR file with suspicious .pdf extension prefix to trick users
Reference:Internal Research
Rule name:SUSP_RAR_with_PDF_Script_Obfuscation_RID34A4
Author:Florian Roth
Description:Detects RAR file with suspicious .pdf extension prefix to trick users
Reference:Internal Research
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

r00 47a8e5c27218e4ec11d4fb2f16d993c2c84a686407d417ed023199149e465d59

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments