MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6228f7fa56d7efb6f826709c0dbf847e7dcfe8e226dad89e5afcf61653cec14c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 6228f7fa56d7efb6f826709c0dbf847e7dcfe8e226dad89e5afcf61653cec14c
SHA3-384 hash: 23677820f6ceadc7bfb6f9ec43e0b425c53a6847907f98b3141d4c33b974feb0c0e707b3109a8b8ce3f56a02cd3e44cf
SHA1 hash: 857cb29dc69c04eba132ed223151c59715a2ed23
MD5 hash: f5ff1d24ec900c9ee05402ee8fbcd107
humanhash: november-lion-alanine-green
File name:ОБРАЗЕЦ.zip
Download: download sample
Signature Formbook
File size:634'842 bytes
First seen:2024-07-15 09:56:31 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:w7sxpBphQRbWPD7uEx5TChc7i9FtYY02AdFVfoPM:jvbhOby+E/TC++xkRoPM
TLSH T1B3D4239BD44F3C1CB1E9B3232C345101679DCAEBFB6873079201E19B8625E974974BAB
Reporter cocaman
Tags:FormBook zip


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?Q?=D0=90=D1=8F=D0=BB=D0=B1=D0=B0=D0=B5=D0=B2_=D0=90=D1=80?=
=?UTF-8?Q?=D0=BC=D0=B0=D0=BD?= <van.duong@alta.com.vn>" (likely spoofed)
Received: "from email.alta.com.vn (email.alta.com.vn [113.161.127.170]) "
Date: "Mon, 15 Jul 2024 05:41:22 +0100"
Subject: "=?UTF-8?Q?RE=3A_=D0=9D=D0=9E=D0=92=D0=AB=D0=99_=D0=97=D0=90?=
=?UTF-8?Q?=D0=9A=D0=90=D0=97_=D0=9D=D0=90_=D0=9F=D0=9E=D0=9A=D0=A3=D0=9F?=
=?UTF-8?Q?=D0=9A=D0=A3?="
Attachment: "ОБРАЗЕЦ.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
187
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:ОБРАЗЕЦ.exe
File size:2'915'453 bytes
SHA256 hash: d852f4642f75bbaa7c0aa90e6aba7761db295baa418eeb42da5a7ca22be2a4d4
MD5 hash: 36ff3d0c15cf8e79fce706eae7da6182
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
Banker Encryption Execution Network Swotter Dexter
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Swotter
Status:
Malicious
First seen:
2024-07-15 09:56:34 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion execution persistence trojan
Behaviour
Runs regedit.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Checks computer location settings
Windows security modification
Adds policy Run key to start application
Command and Scripting Interpreter: PowerShell
UAC bypass
Windows security bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 6228f7fa56d7efb6f826709c0dbf847e7dcfe8e226dad89e5afcf61653cec14c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments