MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cef4f9e5b0c16f4e0778d04dff1616f74408682c923821aaf9aee9c47b867535. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: cef4f9e5b0c16f4e0778d04dff1616f74408682c923821aaf9aee9c47b867535
SHA3-384 hash: e7a0fd5238a56145dfec2e8dbc51274ded98c6369637124305e86d66594aeb66af96929fcb464b529e3b69365b56279b
SHA1 hash: daf588bd2ae2686079d74372dd511c12a27ba19c
MD5 hash: f8f00ad041221c5225fb1487b0bfff72
humanhash: lamp-vegan-cold-sink
File name:PURCHASE ORDER.gz
Download: download sample
Signature Formbook
File size:215'124 bytes
First seen:2021-04-07 05:15:27 UTC
Last seen:2021-04-07 05:16:37 UTC
File type: gz
MIME type:application/x-rar
ssdeep 6144:IxI6NS6caUJKWUO+LFbeVqNMLZpFsWsFqkn3JVzBZx8py:IrNZcaUJKWCekNUP2FFqMJ5BL
TLSH B724232FD490C2821A15F4DDE52074481827A8DDEAA88FD6EC72860AF572CC65FC9FF4
Reporter cocaman
Tags:FormBook gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Roy Asghar <saslam@pseb.org.pk>" (likely spoofed)
Received: "from postfix-inbound-5.inbound.mailchannels.net (inbound-egress-6.mailchannels.net [199.10.31.238]) "
Date: "6 Apr 2021 19:10:11 -0700"
Subject: "=?UTF-8?B?UmU6IOWbnuWkje+8mlB1cmNoYXNlIE9yZGVy?="
Attachment: "PURCHASE ORDER.gz"

Intelligence


File Origin
# of uploads :
2
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Spynoon
Status:
Malicious
First seen:
2021-04-07 02:50:46 UTC
File Type:
Binary (Archive)
Extracted files:
5
AV detection:
13 of 48 (27.08%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

gz cef4f9e5b0c16f4e0778d04dff1616f74408682c923821aaf9aee9c47b867535

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments