MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c592f572b4f87a2427947d58315997c0165d1d5a9aaf0cccbdc42f4cd296a996. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | c592f572b4f87a2427947d58315997c0165d1d5a9aaf0cccbdc42f4cd296a996 |
|---|---|
| SHA3-384 hash: | bb65ab26b68a1e45880a7640204905db3bfef14256991412e7940ea8634ba393077acc36f960d1bbb1b215f4412afad2 |
| SHA1 hash: | c2d8b3a1c1a245e1aca42683760a4b317858bfb1 |
| MD5 hash: | 8f29f0cc0f9a20e7b00431fe10cd5de0 |
| humanhash: | seven-oven-wolfram-idaho |
| File name: | 29092022T.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'134'924 bytes |
| First seen: | 2022-09-29 14:49:46 UTC |
| Last seen: | 2022-09-29 14:54:33 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 24576:UAOcZXcxP6Wv3lTmCunvYa4KwNPoWirfV3pN6k77rvyOMe:CHBZ9uvxONAWI93pN6kDbn |
| TLSH | T13F351242B7D1C472D16219358D3AAB186D7D3D701E249A1FF3E4196EEA326826730BB3 |
| TrID | 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39) 3.6% (.EXE) Win64 Executable (generic) (10523/12/4) 1.7% (.EXE) Win16 NE executable (generic) (5038/12/1) 1.5% (.EXE) Win32 Executable (generic) (4505/5/1) 0.6% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 8271cc9696cc7182 (10 x Formbook, 1 x NetWire) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
a96ccfc5b5b64660b986d22b9bcc96cb5e178d3d506893bd24a959a5338a4a32
80512cf673dd31a9773077d3bb4fdd06b5741f263980c4c1963286737d77c0ec
196d28ffbe79ad0c781de3236791292f10aaf0a1c0442b48105a876fae54bc20
61dd51dcce8bcfdb4821dda40d374c76a5c1dcc64086e4b1ef4d672b56f1897d
c592f572b4f87a2427947d58315997c0165d1d5a9aaf0cccbdc42f4cd296a996
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | malware_Formbook_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Formbook in memory |
| Reference: | internal research |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | RansomwareTest8 |
|---|---|
| Author: | Daoyuan Wu |
| Description: | Test Ransomware YARA rules |
| Rule name: | sfx_pdb |
|---|---|
| Author: | @razvialex |
| Description: | Detect interesting files containing sfx with pdb paths. |
| Rule name: | sfx_pdb_winrar_restrict |
|---|---|
| Author: | @razvialex |
| Description: | Detect interesting files containing sfx with pdb paths. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.