MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8444fb3b56e5ce9643786f9663e364d9a3bb926efe3395485053450950fe8df8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8444fb3b56e5ce9643786f9663e364d9a3bb926efe3395485053450950fe8df8
SHA3-384 hash: aa92e188100eba68861e95f649051d100fc0fe1e49ea7065ae9f33ccbbda72c0aafa8f43dee0412318b44ddd2011f7c5
SHA1 hash: 0809fc325af70e81bfdbf73579abfb9752224471
MD5 hash: 7a95ab7ac86df9e25dba3f7a4004b137
humanhash: venus-zulu-white-mountain
File name:PK2Om5k-july2020-RFQ.exe
Download: download sample
Signature FormBook
File size:670'720 bytes
First seen:2020-07-11 07:06:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'453 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:E3ZRhtwNL/bz/1zH5fxpP+5cFCrLnP5Q5vlgrdm4Vz0RpppppppppppppppppppZ:S0NL1jFxpP2csr7P5Q5v
Threatray 5'148 similar samples on MalwareBazaar
TLSH D5E4CF82A6586720EE29AB706E32C931C7323C6D7935E52C1DE13CCB3F7ABD25525913
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: dlveltex.co
Sending IP: 111.90.145.49
From: EVERSENDAI GLOBLE COMPANY <wejion@ms32.hinet.net>
Reply-To: wejion@ms32.hinet.net
Subject: Re: P0 (2020)-2790 new order
Attachment: PK2Om5k-july2020-RFQ.rar (contains "PK2Om5k-july2020-RFQ.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Launching a process
Launching cmd.exe command interpreter
Reading critical registry keys
Possible injection to a system process
Unauthorized injection to a system process
Deleting of the original file
Unauthorized injection to a browser process
Threat name:
ByteCode-MSIL.Spyware.Negasteal
Status:
Malicious
First seen:
2020-07-11 07:08:05 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Deletes itself
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

a4d42c60ed330f5e2077457a19520800

FormBook

Executable exe 8444fb3b56e5ce9643786f9663e364d9a3bb926efe3395485053450950fe8df8

(this sample)

  
Dropped by
MD5 a4d42c60ed330f5e2077457a19520800
  
Delivery method
Distributed via e-mail attachment

Comments