MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5521357d6eae90ab0326f13d4fcb5d10847f33ec7140caaa13c76cbfe3907c81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA 10 File information Comments

SHA256 hash: 5521357d6eae90ab0326f13d4fcb5d10847f33ec7140caaa13c76cbfe3907c81
SHA3-384 hash: 5dc51fd2e12f9dae7751372dc2f28b62b55c69a2ee526e3fb4e1bc6f3cf216be5c445e1cee28b77a502d329dc736facf
SHA1 hash: 650e794deca9a0977a0b9c8278b65f4b23b1f72c
MD5 hash: de1a59f3755c104e7b6cf8ac0d58d35c
humanhash: sink-cardinal-lake-michigan
File name:Remittance advice.zip
Download: download sample
Signature Formbook
File size:771'851 bytes
First seen:2024-09-11 06:07:15 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:uITzvbbSK7k1SUJVOliMup+nszNZ1WaGwHTZNI7UviXWXwOME9EWq8xKe+:FTztASgO2p5Sap3EWAaEx8xi
TLSH T15DF423471E97D947A57011303DF3C2D6FE98F325FC2C2EA5641A70B82ED5349A01ABB6
Magika zip
Reporter cocaman
Tags:FormBook payment zip


Avatar
cocaman
Malicious email (T1566.001)
From: ""Business" <business@tjxh-international.com>" (likely spoofed)
Received: "from tjxh-international.com (unknown [141.98.10.21]) "
Date: "11 Sep 2024 05:04:35 +0200"
Subject: "Re: Re: Payment "
Attachment: "Remittance advice.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
606
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Remittance advice.exe
File size:1'209'856 bytes
SHA256 hash: 72837dda6a46fef393a6420f045e6ae543908430d3a09fe8d4bfb6f6679c5b53
MD5 hash: 193aa03492c9c88924e2ba266ed28d69
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Result
Verdict:
Suspicious
File Type:
PE File
Behaviour
BlacklistAPI detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit fingerprint keylogger lolbin microsoft_visual_cc packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-09-11 06:07:18 UTC
File Type:
Binary (Archive)
Extracted files:
28
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIt
Author:Jean-Philippe Teissier / @Jipe_
Description:AutoIT packer
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:YahLover
Author:Kevin Falcoz
Description:YahLover

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 5521357d6eae90ab0326f13d4fcb5d10847f33ec7140caaa13c76cbfe3907c81

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments