MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b49e31db6107c37ac7f40732102d9b574f9bdcafbc227d22122a527e5142e9e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b49e31db6107c37ac7f40732102d9b574f9bdcafbc227d22122a527e5142e9e4
SHA3-384 hash: 38002086ca5e4353afbf06f7d9bf2e94a7b9b5b3c972baafa95bcb23a0b844767a0614435da77e00dfd660b371c812f6
SHA1 hash: 9663d0ca118c935428b19e254ce1c2da03439e32
MD5 hash: 6dc7c43be83d4b6b2e214e5bc28330b5
humanhash: carbon-winter-iowa-artist
File name:Shipping Documents and Invoice.exe
Download: download sample
Signature FormBook
File size:394'240 bytes
First seen:2020-06-15 14:04:01 UTC
Last seen:2020-06-15 15:26:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 85bc386bd6a1f821258a1c9abc71d3dd (1 x FormBook, 1 x Sodinokibi)
ssdeep 6144:MeAdJoVnPhdJWCZEaXstzcy/9m6hSIDbpdQgyujHaJ2dCgN:MdyPhDLXYzNJSUbImLogN
Threatray 5'101 similar samples on MalwareBazaar
TLSH A384CE21FA91C031DC630A7A44F5C7B86A3CFD655B258ACB37881F1A7EB41D26336762
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: raw.automatica.mx
Sending IP: 193.143.1.76
From: Purchasing Department <helpens@raw.automatica.mx>
Subject: Purchase Order KL780122 (Urgent) for [REDACTED_DOMAIN]
Attachment: Specification.zip (contains "Shipping Documents and Invoice.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2020-06-15 01:30:33 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of UnmapMainImage
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.sandrxy.com/gw8/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe b49e31db6107c37ac7f40732102d9b574f9bdcafbc227d22122a527e5142e9e4

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments