MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4e51503957292fe946f001fdcaf2b6ac7cd935c7bca80d5f79754c14d93e03d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a4e51503957292fe946f001fdcaf2b6ac7cd935c7bca80d5f79754c14d93e03d
SHA3-384 hash: 435b858b737a0d49813addb784298347bf6f8296d38ae02313d7d6750277f30b9f3f9d1398edca86b8f1cab3ae92a0eb
SHA1 hash: 9cc36597a4578f8c1aadcd82b186a4d48843f723
MD5 hash: 02bc2953e55c6a1123b1c28a38ee7ea9
humanhash: tennis-summer-carolina-winner
File name:DAR_ NALJART TECHNOLOGY_PREORDER LIST.xll
Download: download sample
Signature Formbook
File size:5'120 bytes
First seen:2022-03-01 07:51:05 UTC
Last seen:Never
File type:Excel file xll
MIME type:application/x-dosexec
ssdeep 48:ZvtfeszQNxQKArfxBW57Hob7wmkFB0Gj1BkM/aWESSvHqeqBxeWu:Z12szOagjRtFB0U1MWEQ1
Threatray 14'463 similar samples on MalwareBazaar
TLSH T1D9B15D86B795157BC0741D38D398D43022E6E822FF8AB31225C353F9EC14BD4C769413
Reporter abuse_ch
Tags:FormBook xll

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win64.Trojan.Tnega
Status:
Malicious
First seen:
2022-03-01 02:41:29 UTC
File Type:
PE+ (Dll)
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments