MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 57cfa9ebc3f12db279f1303ceffc86e3ba3a12505f787d8453f200306319e145. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | 57cfa9ebc3f12db279f1303ceffc86e3ba3a12505f787d8453f200306319e145 |
|---|---|
| SHA3-384 hash: | 2fb16962aa7579608fbe80eaad5cf10d54968e47753c4ca8a3f239309c5eb44c20b6675e07d38381c9d8afc666c6805e |
| SHA1 hash: | c235d77b7a7599a83d022a11044518e9529899fc |
| MD5 hash: | b79f94be889635c51ef96a70d69ca79e |
| humanhash: | lemon-west-burger-freddie |
| File name: | PO_210205.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 2'153'984 bytes |
| First seen: | 2021-02-05 05:12:16 UTC |
| Last seen: | 2021-02-05 07:08:55 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 49152:uvko1tPqh6HIeSERlDNfUMR/esuXHZAWd7QC50l1kWGPW:uMxKlDh3uXpd |
| Threatray | 3'750 similar samples on MalwareBazaar |
| TLSH | 4FA5C49D365077DEC81BCE368A681C64EBD0787A870BD20790A31AEDEA5D957CF140F2 |
| Reporter | Anonymous |
| Tags: | FormBook |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
99aae5746d65a99f7d5f1f289d0acebde486e580abfe29976806204b23de6b8d
82c118d71fb0433b051b37a040f31f2455ceb3ddd01b7d314cf6b1f4648d454d
898746d8c0bc244b1a1b7ad40e440bc2ea3ad1f058c5782e4d043ff61add8235
57cfa9ebc3f12db279f1303ceffc86e3ba3a12505f787d8453f200306319e145
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_win32_ransom_avaddon_1 |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects Avaddon ransomware |
| Reference: | https://twitter.com/VK_Intel/status/1300944441390370819 |
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.