MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64d52c04daf4777bc001c3d61565bf659dd1a35cfa776ffae61ee0642a3e53ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 64d52c04daf4777bc001c3d61565bf659dd1a35cfa776ffae61ee0642a3e53ca
SHA3-384 hash: 9418b4be5ea1aa8359dba8308ec0194582c106ea370aa6a76dc3f0b892dd9811c85361433b5886b48dbed53db7963d34
SHA1 hash: 71ea30d620abb7a03d551a8b02a1a7edd4cc468e
MD5 hash: 917268c3f223d515c1a9bb46d089ef1a
humanhash: robin-low-papa-washington
File name:TRANSFER CONFIRMATION_PDF.GZ
Download: download sample
Signature Formbook
File size:335'104 bytes
First seen:2023-02-08 10:51:40 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 6144:pck+QxgRs0AnKMaikHdSuYH9YGw7/b85GDXJYqv9kZiWXIeJre:fe60eKNrTjGwjA5q559kZ5XIeJe
TLSH T1906423F491D96C99431F9A69052CC71B6BB80044B9263F09BFF9B4BEB6287CCC1D9D18
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Caroline Ferrarezi Prestes <caroline.prestes@eslogistics.com.br>" (likely spoofed)
Received: "from mx1.dreamhost.com (unknown [45.137.22.75]) "
Date: "07 Feb 2023 02:34:16 +0100"
Subject: "Fwd: Transfer Confirmation"
Attachment: "TRANSFER CONFIRMATION_PDF.GZ"

Intelligence


File Origin
# of uploads :
1
# of downloads :
106
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:TRANSFER CONFIRMATION.exe
File size:522'700 bytes
SHA256 hash: f10977aa7669d218b31988c0611eee29e2b4603976b8c346672b2cc78beab4d2
MD5 hash: a645de9bd0db4305c07cf5f743177384
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  2/10
Confidence:
83%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2023-02-07 07:07:40 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:win_cannon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

gz 64d52c04daf4777bc001c3d61565bf659dd1a35cfa776ffae61ee0642a3e53ca

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments