MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 50a183b6130552c9a7613ec0f2d81eba5731d4166e92d5249c2ab81e32d4026d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FormBook
Vendor detections: 6
| SHA256 hash: | 50a183b6130552c9a7613ec0f2d81eba5731d4166e92d5249c2ab81e32d4026d |
|---|---|
| SHA3-384 hash: | a780cca1ae75d4fe26470885bb94a4b68c978881f21cdf149461b6323be70f47b3e9127e5f1b77e81ba8e56a6c06cde2 |
| SHA1 hash: | ae8ea6fb30344db863e754318ff7d3326e5fe467 |
| MD5 hash: | d061455274db4dcc9cc54d8bd9dca9ee |
| humanhash: | floor-queen-oven-network |
| File name: | INV_00976HK.exe |
| Download: | download sample |
| Signature | FormBook |
| File size: | 323'072 bytes |
| First seen: | 2020-06-17 06:12:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 6144:BDJSR//LbGKBg3da7WuMMTagamAzyNIum:dk9/Lb/Bi0bamDo |
| Threatray | 5'112 similar samples on MalwareBazaar |
| TLSH | 5864F20DB6AC1735DA7D4A7C99F1354807F8A4277825EA1A9F8432EE1C63BC61B42F03 |
| Reporter | |
| Tags: | exe FormBook |
abuse_ch
Malspam distributing FormBook:HELO: disey.com.mx
Sending IP: 184.154.61.154
From: MML Law Firm <ventas@srr.com.mx>
Subject: COURT SUE M1
Attachment: INV_00976HK.rar (contains "INV_00976HK.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-17 06:14:08 UTC
AV detection:
26 of 31 (83.87%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 5'102 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
trojan spyware stealer family:formbook persistence evasion
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
System policy modification
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Deletes itself
Reads user/profile data of web browsers
Adds Run entry to policy start application
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.