MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8369bd63517c94a16960d6cb5cb57867e75e4b9f7cf85ab1f92e97c4ee04d84f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8369bd63517c94a16960d6cb5cb57867e75e4b9f7cf85ab1f92e97c4ee04d84f
SHA3-384 hash: a22814527a9ef7ddddd6bcafe24e2012c488a887b77ad67148f460693a169ee53b0ee9b672d9c3aea09622032b453157
SHA1 hash: 779fba2a069e86894674580f8c17e8db3d416f6c
MD5 hash: 8df8242679d01b0b0dd79ddf7674b299
humanhash: connecticut-twelve-alanine-wolfram
File name:nova narudžba.zip
Download: download sample
Signature Formbook
File size:624'394 bytes
First seen:2021-04-15 08:39:02 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:RdZPRN+qP9m01jInwRfJ6N6YdJe6+7cQlECU4Br/7JaYnM:RdZRN+qkSIMxFoeRcQs4tJW
TLSH B3D42348A32DE67BCB6B5BF03A1199B536B146E5174024813AE4DCAC5CB8FF206D6F07
Reporter cocaman
Tags:FormBook zip


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?Q?=E2=80=AAIgor_Primorac=E2=80=AC?= <info@zrak.ba>" (likely spoofed)
Received: "from linhost02.utic.net.ba (linhost02.utic.net.ba [195.130.35.141]) "
Date: "Thu, 15 Apr 2021 07:26:07 +0000"
Subject: "Zahtjev za ponudu -"
Attachment: "nova narudžba.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2021-04-15 08:39:12 UTC
File Type:
Binary (Archive)
Extracted files:
48
AV detection:
3 of 47 (6.38%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook evasion rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Maps connected drives based on registry
Checks BIOS information in registry
Looks for VMWare Tools registry key
Formbook Payload
Looks for VirtualBox Guest Additions in registry
Formbook
Malware Config
C2 Extraction:
http://www.quetech.info/ykl/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 8369bd63517c94a16960d6cb5cb57867e75e4b9f7cf85ab1f92e97c4ee04d84f

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments