MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c79bd4c69c806e1516f6cf2160ffa1172e074fbe652bd3793f661aaa39cccab9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | c79bd4c69c806e1516f6cf2160ffa1172e074fbe652bd3793f661aaa39cccab9 |
|---|---|
| SHA3-384 hash: | 3f7d76d3a059c02a5806aa0236df02f81179bbfa2af2b919dc26d658c52b8e165fbb6caa24e834159bc1803be434746d |
| SHA1 hash: | 2e6ba4c7b2f527bb4413b0c87cf2daa213d8daa9 |
| MD5 hash: | 4abe5720d3fbeb021ca029691fdb617a |
| humanhash: | cold-coffee-eighteen-kansas |
| File name: | PO#5443788921445GRTATTMCD.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 863'744 bytes |
| First seen: | 2022-09-20 18:58:48 UTC |
| Last seen: | 2022-09-28 07:10:53 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:Xpu876eIp0akH7LKAiS9GSwR2dgwqacHQVMLTQKrNmjgb9eBDDq:E8+eIpVkHHF9wkePHpTQKrIjWeB |
| TLSH | T14805BF14126DCA06C879AA70CCD3E2711BEB5DD5425AC23789DBBCB7F136358E893362 |
| TrID | 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.4% (.EXE) Win64 Executable (generic) (10523/12/4) 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.4% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
877b26e0bec03030ed3d0d7a92c53c46e6f696df51be924817421f1685d21b50
96df49e0deef67a2fc032cf1018662606bdef066655c1f31f135ccf8e68bace5
70d121cfabbbf118335b8ae4f6a3a072f09ce2f11bd73c711120fa9070d608e3
a0bb4aba51b98f18ee5fb62cca841faf2e7aabb304300cc7d4d90125cba09d61
c79bd4c69c806e1516f6cf2160ffa1172e074fbe652bd3793f661aaa39cccab9
51f2aed60e4e94e4ff442a809b63f4dd3a05b2b0e8d6dad5e595f7c2a01f892b
cd5be9697ae42581a073c8bb97da6b7d67becea5e83b4dc259b0e47ef54029d9
e8911ed914364aaa1dbffcfe55c53e2932e9f38ea490523a8bcaf8e13633187a
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_win32_ransom_avaddon_1 |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects Avaddon ransomware |
| Reference: | https://twitter.com/VK_Intel/status/1300944441390370819 |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | RansomwareTest4 |
|---|---|
| Author: | Daoyuan Wu |
| Description: | Test Ransomware YARA rules |
| Rule name: | RansomwareTest5 |
|---|---|
| Author: | Daoyuan Wu |
| Description: | Test Ransomware YARA rules |
| Rule name: | RansomwareTest7 |
|---|---|
| Author: | Daoyuan Wu |
| Description: | Test Ransomware YARA rules |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.