MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf21b3b3efe3cbd55364efb0265ce6f7fb69ac38545791d410e98fdacf998462. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA 6 File information Comments

SHA256 hash: cf21b3b3efe3cbd55364efb0265ce6f7fb69ac38545791d410e98fdacf998462
SHA3-384 hash: 169beea2eab92360ccb13044f4edb14e0dc59c3c3bd83dfee6c7e34d36bb6327d27635c5f1efb0e62ca9e15599f93669
SHA1 hash: 7b1968fb24d755c15dbd909a3a1f933cb86938f7
MD5 hash: 7cdfa893a7698d03d561aa014af1a204
humanhash: yankee-alaska-equal-burger
File name:Proforma Invoice is attached.zip
Download: download sample
Signature Formbook
File size:334'284 bytes
First seen:2023-04-12 12:44:47 UTC
Last seen:2023-04-12 12:46:16 UTC
File type: zip
MIME type:application/zip
ssdeep 6144:SZgbpuHNZL+Jz2o95JxrPKunEqO62+Lp7jZ146tZ50DUTHwnzvSD96j6Y2fWPpCH:ugVcmJz/iunEqO62+Lpc6tTTug6G5W8
TLSH T1586423601A2391FB54003FC1FF91002A996986B787CB81D8F5C577A1E87C2A7FD3662E
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:FormBook INVOICE zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Mohsin Ali Butt <info@mef.ae>" (likely spoofed)
Received: "from pkz36-2-spamexpert2.hoster.kz (pkz36-2-spamexpert2.hoster.kz [185.111.104.21]) "
Date: "Wed, 12 Apr 2023 01:08:47 -0700"
Subject: "Re: Re: Proforma Invoice"
Attachment: "Proforma Invoice is attached.zip"

Intelligence


File Origin
# of uploads :
2
# of downloads :
736
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Fmywfytcpwdmvi.exe
File size:724'480 bytes
SHA256 hash: 94aa407f90054e51d00b6c555ef7b566944290e990f3790bf18579afe0cf60b2
MD5 hash: 3df32efa05c88263b4ab0001b5b86aca
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
dealply keylogger overlay zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-04-12 12:44:52 UTC
File Type:
Binary (Archive)
Extracted files:
38
AV detection:
6 of 37 (16.22%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader persistence trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader Second Stage
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_dbatloader_g1
Author:Slavo Greminger, SWITCH-CERT
Description:targets stager

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip cf21b3b3efe3cbd55364efb0265ce6f7fb69ac38545791d410e98fdacf998462

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments