MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d79ff402299dcf2d71c104beb763f0e3893eb857622cc07d8969aa08541950f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: d79ff402299dcf2d71c104beb763f0e3893eb857622cc07d8969aa08541950f9
SHA3-384 hash: 15af5eb659b78694dea5d4b4fc0a757a56cf10864a0f10f9026ae57c7695a61b5193fbcf2c29db7ad0dd973b132ed492
SHA1 hash: 808469565b52228e2b2ff513dc07e2ff6f772f88
MD5 hash: 377c75f202ae05ff23d2de9b117fa39e
humanhash: uranus-sodium-papa-oranges
File name:REQUEST FOR QUOTATION.exe
Download: download sample
Signature FormBook
File size:758'784 bytes
First seen:2020-05-04 20:24:20 UTC
Last seen:2020-05-04 20:43:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'207 x SnakeKeylogger)
ssdeep 12288:CW3W5BFj6PVVY98bW5G+fHizIhlpnd3QczSbAH/IySeonCWgzydYr5emyp7F0uDz:Rz62z0lVd3xzc
Threatray 5'107 similar samples on MalwareBazaar
TLSH 1DF472997670FDEFC8A7D4738A683C64AE5C2CA6471B7103902735A9ED7D887CF140A2
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: 3sapparel.co
Sending IP: 111.90.140.230
From: Stuti Sharma <stuti.sharma1@petrofac.com>
Reply-To: achingodze@gmail.com
Subject: Request for the Quotation.
Attachment: REQUEST FOR QUOTATION.rar (contains "REQUEST FOR QUOTATION.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-04 06:40:53 UTC
File Type:
PE (.Net Exe)
Extracted files:
46
AV detection:
25 of 30 (83.33%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.nimtax.com/ut/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe d79ff402299dcf2d71c104beb763f0e3893eb857622cc07d8969aa08541950f9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments