MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 65fef0825244239ee368dc96574652ceb31452ba4916aacda68819c50aa7369e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 65fef0825244239ee368dc96574652ceb31452ba4916aacda68819c50aa7369e
SHA3-384 hash: a7debbc2b0ca33cc3b8be4799fc87b0612747bf88675b4b5641e21195c8cf14883bac56b2cca34491cb459aa1f965eaf
SHA1 hash: 602c920625e801177638c6d388a5010e0b32f725
MD5 hash: 6db311c2d77b745601c87f47259e7d34
humanhash: fanta-four-lemon-winter
File name:Quote order#098799.zip
Download: download sample
Signature Formbook
File size:725'052 bytes
First seen:2022-04-04 14:39:31 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:qS2MlzZhvXySEU5sqWw9jcjh0JV0NZOWsssExhkqdb0gd7YS197NtJzN3xOSvjLY:qslDvCSZ39j7V0DKEXhdLUWtrxOKjLNy
TLSH T132F4335AB20DA69EC73CD063079AF8F518BD061E07286E4EC253E8EC935674B1A05DE6
Reporter cocaman
Tags:FormBook zip


Avatar
cocaman
Malicious email (T1566.001)
From: "bkmfilter.sales@gmail.com" (likely spoofed)
Received: "from [2.58.149.14] (unknown [2.58.149.14]) "
Date: "4 Apr 2022 15:24:19 +0200"
Subject: "Quote order#098799"
Attachment: "Quote order#098799.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2022-04-04 14:40:09 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
8 of 41 (19.51%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:e0i2 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 65fef0825244239ee368dc96574652ceb31452ba4916aacda68819c50aa7369e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments