MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c74be4460e00af962d51e8bc1c9f0f57df1669b558993769afd621af94fc9ef6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c74be4460e00af962d51e8bc1c9f0f57df1669b558993769afd621af94fc9ef6
SHA3-384 hash: bb1e5fae98adffcdec1490e0ba0e50fec3922327849e24d9aa6e843b97d0a5f2ba1a2bce3c1087ae88efd22942a40802
SHA1 hash: 86acba7532757be308f2ba1779c730eed2c0e605
MD5 hash: af98fb002c142d1dd59cc2c396c87ce9
humanhash: bluebird-whiskey-mike-winter
File name:Purchase OrderPDF.zip
Download: download sample
Signature Formbook
File size:190'114 bytes
First seen:2021-07-10 05:57:37 UTC
Last seen:2021-07-10 05:57:59 UTC
File type: zip
MIME type:application/zip
ssdeep 3072:9ZU1t1f+mYTomywc62rP/HWu3FX62Of4Xo9rI/O58Tk7WbPSSLHJt5GCObh+H:At1bJwcHWd2Y0o8TOHmP5DCh+H
TLSH T1DD04236A824FB039814F2FE4683341B5CB61DCF22850DDFA35D4FA599F8DD968E01C66
Reporter cocaman
Tags:FormBook INVOICE zip


Avatar
cocaman
Malicious email (T1566.001)
From: "John Chen <smtp-1nbxo@intokutravel.com>" (likely spoofed)
Received: "from cp96.zonasprivadasdns.com (cp96.zonasprivadasdns.com [185.50.197.96]) "
Date: "9 Jul 2021 14:23:25 +0100"
Subject: "rfq Invoice"
Attachment: "Purchase OrderPDF.zip"

Intelligence


File Origin
# of uploads :
2
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Androm
Status:
Malicious
First seen:
2021-07-09 11:39:06 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
9 of 46 (19.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip c74be4460e00af962d51e8bc1c9f0f57df1669b558993769afd621af94fc9ef6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments