MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 81d5bdb550292a188ea1fbc1890aa730019275427b64620e1d115f376abbdd64. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 81d5bdb550292a188ea1fbc1890aa730019275427b64620e1d115f376abbdd64
SHA3-384 hash: 8f2a7299071671377bdaf693ac6dc3c31e67938f9f7f22bb93a8e737ff71be6a62735b911539643e778c4f60b9043c58
SHA1 hash: a7901407a0483b8e07cf1e9cc885c9830c9560af
MD5 hash: 78e90907c1b3e61739af2e60854d65fb
humanhash: blossom-alabama-sweet-aspen
File name:U prilogu je predracun.zip
Download: download sample
Signature Formbook
File size:420'447 bytes
First seen:2023-06-13 10:01:16 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:TufsMyApdI4BooXvJ51KazfRpAUf/zSic9/w93X6xW0io60m/W:TmIKJfJXXzf4WzSxw93qxCoT
TLSH T178942349D460D6B28AE750AD2C6A05C8B5ADA6C1BC14F4B78CED1733DA9F2EC11C683C
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:FormBook zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Dejan Petrovski <Dejan.Petrovski@bes-me.com>" (likely spoofed)
Received: "from ns2.koeinhosting.com (ns2.koeinhosting.com [209.160.40.54]) "
Date: "Tue, 13 Jun 2023 10:47:11 +0100"
Subject: "=?UTF-8?Q?RE=3A_Predra=C4=8Dun?="
Attachment: "U prilogu je predracun.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:U prilogu je predracun.exe
File size:845'824 bytes
SHA256 hash: 7382318f5904040997bf14967bce3df6b323bf03901976df75a9b0e822dc5db8
MD5 hash: b7f605030c86e9c698e70b04cbf7b861
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger lolbin overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2023-06-13 10:01:19 UTC
File Type:
Binary (Archive)
Extracted files:
52
AV detection:
7 of 37 (18.92%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:modiloader family:xloader campaign:uj3c loader persistence rat spyware stealer trojan
Behaviour
Gathers network information
Modifies Internet Explorer settings
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Reads user/profile data of web browsers
ModiLoader Second Stage
Xloader payload
Formbook
ModiLoader, DBatLoader
Xloader
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 81d5bdb550292a188ea1fbc1890aa730019275427b64620e1d115f376abbdd64

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments