MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7e1189af14bcd8743a40b3bb29d42a6aad0ed7894c6214c85cb7772b3b39c5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: a7e1189af14bcd8743a40b3bb29d42a6aad0ed7894c6214c85cb7772b3b39c5c
SHA3-384 hash: e76e4ca2b0e8f3b1bf696d56b8570472f0ce9348b6f446fa3ff11b2aab3b04d6c327cf33c009b051d5750b3ff5fe3f83
SHA1 hash: 8bc10a2cfa536c8320a28aa4e155f848968cdb8f
MD5 hash: 61f8413f949a26f64f682a9264e38b87
humanhash: don-burger-spaghetti-minnesota
File name:Statement Of Account 2023.rar
Download: download sample
Signature Formbook
File size:949'937 bytes
First seen:2023-09-22 14:46:48 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:WNHerDwr84BPXd8MGOgZiIh81LXHB07/Djy+Bi3:8HeHd2+nZVsjS/Djy+BO
TLSH T1E11523933B5F0E970776A2D54248FBAFA63225CCBF6CA97E70861035F2A41D885531E3
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook rar


Avatar
cocaman
Malicious email (T1566.001)
From: "Jenny Chiang <palia_k@yahoo.com>" (likely spoofed)
Received: "from [81.161.229.115] (unknown [81.161.229.115]) "
Date: "22 Sep 2023 06:48:57 +0200"
Subject: "Statement of Account 2023"
Attachment: "Statement Of Account 2023.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Statement Of Account 2023.exe
File size:1'184'768 bytes
SHA256 hash: 99160f7ca07e18bc3a131520825ab4ce8d2f4c57b63bffc89d8e18d5a7fa25ce
MD5 hash: fe13115acb8c1517503b3f68cc4c4970
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-09-22 04:35:50 UTC
File Type:
Binary (Archive)
Extracted files:
20
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:sn26 rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook payload
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar a7e1189af14bcd8743a40b3bb29d42a6aad0ed7894c6214c85cb7772b3b39c5c

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments