MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 86ae7a9ee97a24be6bd0398599128870896c0b8c09f638c123941e093d4cbfba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | 86ae7a9ee97a24be6bd0398599128870896c0b8c09f638c123941e093d4cbfba |
|---|---|
| SHA3-384 hash: | 065375cad1945c850fee890a47ffe2a4c56fa92ccc2e79e2d6ff4364664d0a5a676fe584044c4aac29ee1862f58d270b |
| SHA1 hash: | 0bc8f8641ae342068b835fefde3a988ee967e76c |
| MD5 hash: | b557e86426cae7435e219702245c096a |
| humanhash: | sierra-lactose-indigo-steak |
| File name: | PURCHASE ORDER-6350.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 948'736 bytes |
| First seen: | 2024-10-07 08:12:03 UTC |
| Last seen: | 2024-10-07 08:33:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'737 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 24576:8tHUbOzOSPUOval4ImjXk0cnD+FL1Ditg:8tHUSOSPZal4ImjXk0A6N1+ |
| Threatray | 173 similar samples on MalwareBazaar |
| TLSH | T1B015E01862A98F05E4BA47F45A24D27447B57C9E782AE34E4EC27CEB3D737024F46A07 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10523/12/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
405f4016376e02c97d8509d2627c7bb3be0583f46aa5a1ea57d96252b759f1f9
84d6ace5c1e4f08f38bc1fb749b7f06e6eb7750e45d6b97b61ee08483ae8538b
d55b00b7cb5305371e1cc170179e7025cc517b810e57992adab16893b410985e
8b528f3a173e7e40394c21bb0cfa0304ef12b58ab185de1da8e4b4e5231eee8a
86ae7a9ee97a24be6bd0398599128870896c0b8c09f638c123941e093d4cbfba
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.