MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f6cc56f67e35b039a881c9994bd4ef7f99690d338f4603bd8c8d0534c5114f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 4f6cc56f67e35b039a881c9994bd4ef7f99690d338f4603bd8c8d0534c5114f4
SHA3-384 hash: 05a4937ce29441ef39b5d08139f82adad1f75275e7b6a59a5f7b93f9c701746882bbfeac9a0bc6f6a3c8c66b2895b00d
SHA1 hash: 8ddedd194222fd2ee85f5132018b2075f929943a
MD5 hash: 24063af7bfa0ca0fcfaa0dc2e6e3edde
humanhash: golf-april-robin-jupiter
File name:URGENT REQUEST.rar
Download: download sample
Signature Formbook
File size:580'665 bytes
First seen:2023-06-05 11:03:14 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:CmXKuNxhBDprWcmWIR9iQ9I3kHFyCdW8Svbv+5r+rAMnO:B7x7VSTLRkEvHFLWd6B+rAd
TLSH T15EC423C1D4E106D4CBE31861796F2692A4377CBCCFE01CBA8181FD5494E247F7BA58AA
TrID 58.3% (.RAR) RAR compressed archive (v-4.x) (7000/1)
41.6% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook payment rar


Avatar
cocaman
Malicious email (T1566.001)
From: ""Grace Chu" <mahindranorthcoast@telkomsa.net>" (likely spoofed)
Received: "from telkomsa.net (unknown [185.222.58.57]) "
Date: "22 May 2023 15:20:47 +0200"
Subject: "RE: PAYMENT TO BANK DETAILS (CONFIRM BANK DETAILS)"
Attachment: "URGENT REQUEST.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:URGENT REQUEST.exe
File size:735'744 bytes
SHA256 hash: 93a9ea827dd8635158be7b107a40feeb50a52566698915f0c499a5f50c157200
MD5 hash: bfcc7c29b09747aaf19d959f3a2840ee
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
formbook nanocore packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-05-22 14:32:52 UTC
File Type:
Binary (Archive)
Extracted files:
27
AV detection:
25 of 37 (67.57%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:m82 rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Formbook payload
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar 4f6cc56f67e35b039a881c9994bd4ef7f99690d338f4603bd8c8d0534c5114f4

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments