MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 3 Comments

SHA256 hash: cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49
SHA3-384 hash: 2f7799cd534239cd07f2bedee83df6e425d5356f34153ac815e30e36b835c127809e16261e326e35f4634affaa5b1c16
SHA1 hash: fb32e85f940945c6c0d3052b80f48f5bc48f7c7d
MD5 hash: 4cd3bc98fa3df22248c7e5d63dbe1168
humanhash: alaska-carpet-queen-jersey
File name:PO389732.exe
Download: download sample
Signature Formbook
File size:333'312 bytes
First seen:2020-06-30 05:22:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744
ssdeep 6144:psx/Lx562xu65MKNoGnHT41DZ8LaMfXF9WrVrcPLevs:psx/d5VX5ZNn4L8L1fPqVs
TLSH FA64E138321FAC3BC66805F94591965843B5ACB93643F3D9DCC972E806FABEC4B01967
Reporter @abuse_ch
Tags:exe FormBook


Twitter
@abuse_ch
Malspam distributing Formbook:

HELO: regular1.263xmail.com
Sending IP: 211.150.70.202
From: Leona <admin@yingshitech.com>
Subject: Re:new order
Attachment: PO389732.zip (contains "PO389732.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
35
Origin country :
US US
Mail intelligence
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-30 05:23:06 UTC
AV detection:
24 of 31 (77.42%)
Threat level
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
spyware persistence trojan stealer family:formbook
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
System policy modification
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Drops file in Program Files directory
Suspicious use of SetThreadContext
Reads user/profile data of web browsers
Deletes itself
Adds Run entry to policy start application
Formbook

Yara Signatures


Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_formbook_g0
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments