MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ac0b1f47f36bdbc8974390d8473d74f6e71d5219a338796ed9d0582f8020f8c7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | ac0b1f47f36bdbc8974390d8473d74f6e71d5219a338796ed9d0582f8020f8c7 |
|---|---|
| SHA3-384 hash: | 994f29e0f1b173c3024962da365e0edc96d6948b07c0e33877a8087e3527006cae41b7b986853cad73f679882f7daf5c |
| SHA1 hash: | 4bd259f7c707aaee689c29ffe7bc38776b275737 |
| MD5 hash: | f9bec48a37ed98a974077a4f6afb4516 |
| humanhash: | lactose-indigo-eleven-triple |
| File name: | MT103 SWIFT.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 690'688 bytes |
| First seen: | 2024-01-29 09:24:19 UTC |
| Last seen: | 2024-02-05 08:33:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'658 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:+yTAoIFFHgeg/cAJt7l2ycDhisk1b893U5ib8vjYM9G4ZRUGY+rddsQuW:+yTAXFxA7Qy6k1g93wd9GkRScHs7W |
| TLSH | T146E4128037EC5B66DABF8BF4195180508B7A3A277AA6E30D4DC260DE0D72F0157A5F1B |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
21a34d80499260fcf691ed16c83da9f3a9d14a7e2299d73d7976112230a98e5a
2a1b5e6dcd2c73e73fa3cdd788771c9f25152cb60d8c8ad186983327f541d0fa
96deb2b04135c0b3d7f7ad059870a3fb2e8aebcf8c260df81f507d8fbe71fb5c
b98dbe3fbbc3aebd02d205d45b61c61d71b83bc8cec5435bb6e5c9b880872f73
37b8750101990658c22bfd86276c1b8ae86b627a40ac5b8ce20b9b305a3ff465
2a321e21bd01aa4f0ff4793c7ab4b2bcc01ff89f098b39daa0ba1e335f05ca2a
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.