MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4ec306da2adb14c21343e964d46ddc833ab727266c3d46b382ae69c703230ae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA 6 File information Comments

SHA256 hash: a4ec306da2adb14c21343e964d46ddc833ab727266c3d46b382ae69c703230ae
SHA3-384 hash: ffe6dcd186631aeaf5c7ade51dcf406fa83a223f2c440134397410cb8c89c2a0cf6fe9cf367f01440974dc17b1774b18
SHA1 hash: baec3671bfd454f44b1382d37a551d5bad98282f
MD5 hash: 4b82673a736660fde870884c40298035
humanhash: uniform-oklahoma-mango-purple
File name:AWB5889829680.rar
Download: download sample
Signature Formbook
File size:15'675 bytes
First seen:2024-04-03 13:23:23 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 384:10biKN+WdbcNx7GIAX3sey70xhfvKCR5qMst4E91wBWFl2:10biKN+WONx7ZGVRxxx2r1ckA
TLSH T1BF62D041B4484B44BFA38331C78F2CCE9397B4A1866C47E504407AD8BFB5B16E9696ED
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:DHL rar


Avatar
cocaman
Malicious email (T1566.001)
From: "DHL Service <admin@jsygjskj.co>" (likely spoofed)
Received: "from peruse.jsygjskj.co (peruse.jsygjskj.co [185.236.228.17]) "
Date: "03 Apr 2024 13:22:23 +0000"
Subject: "Shipment Notification"
Attachment: "AWB5889829680.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
CH CH
File Archive Information

This file archive contains 2 file(s), sorted by their relevance:

File name:AWB5889829680.scr
File size:32'256 bytes
SHA256 hash: 84176781043f8f95306328477f7b28fa721f44b1767fe740cbd207233c2a47c6
MD5 hash: 14d1f9fe1739050d297d56b1d848cbb8
MIME type:application/x-dosexec
Signature Formbook
File name:32512
File size:20 bytes
SHA256 hash: 91abc657a5b61c152b7d5e5de12c6fab2bc3354839617fad21ca8a8bdccc7566
MD5 hash: 9af046fb1f4344d0055c3a29fa340b77
MIME type:application/octet-stream
Signature Formbook
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2024-04-03 13:17:19 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_DiscordURL
Author:ditekSHen
Description:Detects executables Discord URL observed in first stage droppers
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_Discord_Attachments_URL
Author:SECUINFRA Falcon Team
Description:Detects a PE file that contains an Discord Attachments URL. This is often used by Malware to download further payloads
Rule name:SUSP_PE_Discord_Attachment_Oct21_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious executable with reference to a Discord attachment (often used for malware hosting on a legitimate FQDN)
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar a4ec306da2adb14c21343e964d46ddc833ab727266c3d46b382ae69c703230ae

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments