MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8215f0a542629e502e4b27019455d0dd2636712c14eaa43501ed4c836f566593. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA 9 File information Comments

SHA256 hash: 8215f0a542629e502e4b27019455d0dd2636712c14eaa43501ed4c836f566593
SHA3-384 hash: 8f5841ff115e3f2d66859ffc2a336bf48940bf7536c17189e0f7e3ad83c3f8c62ad1f1924245cd3d73dc8e96c96a3687
SHA1 hash: a3330f7247c2b90186f196fba6a49e5e5e99bfb4
MD5 hash: 5b14186f7872d6679dbc552e62cad798
humanhash: connecticut-mobile-carpet-vermont
File name:Quotation #10091.zip
Download: download sample
Signature Formbook
File size:747'912 bytes
First seen:2024-09-24 16:54:56 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:h/gBT51V14eECqni+OaKi4qRZVhuKFqNrUrReqGHiZBGjA/q8KoJL3Rg:NgBTS7ntV4q7WxUNeq3fPq
TLSH T19FF433BB72336C2294057552531A230F70BB827F0818F69FA45B7CCFC928AB5756E398
Magika zip
Reporter cocaman
Tags:FormBook QUOTATION zip


Avatar
cocaman
Malicious email (T1566.001)
From: "JW Chen <qian.zhu@nitto.com>" (likely spoofed)
Received: "from nitto.com (unknown [141.98.10.88]) "
Date: "24 Sep 2024 18:48:51 +0200"
Subject: "RE: Quotation #10091"
Attachment: "Quotation #10091.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
571
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Quotation #10091.exe
File size:762'831 bytes
SHA256 hash: 36421bdf90ea83d4e677a54710f4d35e2bc15a1222c4abb17e78996029f53c97
MD5 hash: 1f3a6997ed55ef6be6beccfc1996e011
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.9%
Tags:
Encryption Stealth Swotter Injection Exploit Autoit
Result
Verdict:
Suspicious
File Type:
PE File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autoit lolbin microsoft_visual_cc overlay packed packed packed shell32 upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Autoitinject
Status:
Malicious
First seen:
2024-09-24 16:54:59 UTC
File Type:
Binary (Archive)
Extracted files:
55
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Script
Author:@bartblaze
Description:Identifies AutoIT script. This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 8215f0a542629e502e4b27019455d0dd2636712c14eaa43501ed4c836f566593

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments