MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 619d4e1b1790067c1e4479df8480461ee7d2317ceff763d5c7eb86b566feb54d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA 6 File information Comments

SHA256 hash: 619d4e1b1790067c1e4479df8480461ee7d2317ceff763d5c7eb86b566feb54d
SHA3-384 hash: 2b2c040a51fdf7e2606cd78dee6624f6b7bf58fb36e3dfe5e4dc8e904e26692bf08336229d7eb5607d100ba2c3eda17a
SHA1 hash: d529a3cc1ca90936736e2f5f0870adbb4f2cb67e
MD5 hash: 38c4db11055aa27addbad4bbd008df8c
humanhash: glucose-nuts-summer-magazine
File name:Scan_Order.zip
Download: download sample
Signature Formbook
File size:225'094 bytes
First seen:2022-11-16 07:39:19 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 3072:H4ILgUYnxyjQC97QTW2USYOqs6jyO4eyxH9ptfaxh6+z/svBGdEGxLBNjJPkX+:H4IGxyjc/RnYzMzgLz/sZ4HTNj6O
TLSH T1532423634AA35097591157550DEC198A62EECD23FFC896BD07E91B3BC3234AA1CE083F
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:FormBook zip


Avatar
cocaman
Malicious email (T1566.001)
From: ""Wendy Choi" <bel.dot@questext.com>" (likely spoofed)
Received: "from emjrkgle.questext.com (emjrkgle.questext.com [92.52.217.109]) "
Date: "Wed, 16 Nov 2022 00:01:14 +0000"
Subject: "A VERY TOP URGENT REQUEST"
Attachment: "Scan_Order.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Scan_Order.exe
File size:237'977 bytes
SHA256 hash: 48f874286909722bc890448810d0ebd5b3b711e9511e08fcd07fea4f59910ba2
MD5 hash: 3cd3031ee2d634046cc2d254448dd140
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll threat
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-11-16 03:04:16 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
22 of 40 (55.00%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:6obn rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:Windows_Trojan_Formbook
Author:@malgamy12
Rule name:Windows_Trojan_Formbook_1112e116
Author:Elastic Security
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.
Rule name:win_formbook_g0
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 619d4e1b1790067c1e4479df8480461ee7d2317ceff763d5c7eb86b566feb54d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments