MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c74be4460e00af962d51e8bc1c9f0f57df1669b558993769afd621af94fc9ef6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 4
| SHA256 hash: | c74be4460e00af962d51e8bc1c9f0f57df1669b558993769afd621af94fc9ef6 |
|---|---|
| SHA3-384 hash: | bb1e5fae98adffcdec1490e0ba0e50fec3922327849e24d9aa6e843b97d0a5f2ba1a2bce3c1087ae88efd22942a40802 |
| SHA1 hash: | 86acba7532757be308f2ba1779c730eed2c0e605 |
| MD5 hash: | af98fb002c142d1dd59cc2c396c87ce9 |
| humanhash: | bluebird-whiskey-mike-winter |
| File name: | Purchase OrderPDF.zip |
| Download: | download sample |
| Signature | Formbook |
| File size: | 190'114 bytes |
| First seen: | 2021-07-10 05:57:37 UTC |
| Last seen: | 2021-07-10 05:57:59 UTC |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 3072:9ZU1t1f+mYTomywc62rP/HWu3FX62Of4Xo9rI/O58Tk7WbPSSLHJt5GCObh+H:At1bJwcHWd2Y0o8TOHmP5DCh+H |
| TLSH | T1DD04236A824FB039814F2FE4683341B5CB61DCF22850DDFA35D4FA599F8DD968E01C66 |
| Reporter | |
| Tags: | FormBook INVOICE zip |
cocaman
Malicious email (T1566.001)From: "John Chen <smtp-1nbxo@intokutravel.com>" (likely spoofed)
Received: "from cp96.zonasprivadasdns.com (cp96.zonasprivadasdns.com [185.50.197.96]) "
Date: "9 Jul 2021 14:23:25 +0100"
Subject: "rfq Invoice"
Attachment: "Purchase OrderPDF.zip"
Intelligence
File Origin
# of uploads :
2
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
MALICIOUS
Link:
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2021-07-09 11:39:06 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
9 of 46 (19.57%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.47
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.