MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f3e54772180ae88b60845cc87d6c4675481b02c340005e35fd8c23a0dbf0c3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 7f3e54772180ae88b60845cc87d6c4675481b02c340005e35fd8c23a0dbf0c3d
SHA3-384 hash: d15337b7f1661b37e3dd1374a02f6afe39ee5b34d49008e1eb39b1d90d00d46e19b09fcb9bd8e354988dc1e4e998ff2c
SHA1 hash: b28d9d1eaf6228e71031fca0749ffa95b0037f33
MD5 hash: 8e622cdc206d192aca92afcde837ba02
humanhash: uncle-sierra-nine-yankee
File name:Inquiry.rar
Download: download sample
Signature Formbook
File size:747'181 bytes
First seen:2023-03-17 16:17:55 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:6LbqUhtZ+/XX7xKO0a5mKMgkneOD2E+4lDKwDh724w5rJoc061eJB68CJj/q9qgd:6XdtZebxK9a5nWr2ODKwDh6Tgx6Iv6lQ
TLSH T1BBF43386C6DA7738AA8928079EF7A00A5C17673B652F3BB8CCC51408F71C865976F06D
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook rar


Avatar
cocaman
Malicious email (T1566.001)
From: ""Business Development"<marketing@ilfiore-rosso.com.qa>" (likely spoofed)
Received: "from [103.74.106.239] (unknown [103.74.106.239]) "
Date: "17 Mar 2023 21:05:37 +0700"
Subject: "Inquiry"
Attachment: "Inquiry.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Inquiry.exe
File size:887'808 bytes
SHA256 hash: 180284f76be1f524875609de4bb4e02cb30a969a438bd871198830ec393afe0f
MD5 hash: a69fb4fbd836032cf9878635b031d476
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2023-03-17 16:18:08 UTC
File Type:
Binary (Archive)
Extracted files:
26
AV detection:
11 of 39 (28.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AlternativesExample1
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar 7f3e54772180ae88b60845cc87d6c4675481b02c340005e35fd8c23a0dbf0c3d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments