MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 daf2171fbf6da5a14b9ac720e3f6a1f75d8d7c1d3e3be02c308ae4faa854eb65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: daf2171fbf6da5a14b9ac720e3f6a1f75d8d7c1d3e3be02c308ae4faa854eb65
SHA3-384 hash: e9aa63cb13567e3b67111e6d51a345e6fbd600482e790493ca6c9da4d0eae70f422d04c9c1e1321adfadf62a45e7b854
SHA1 hash: 44e1e92010cbc510764461ce58aedf518cf8562c
MD5 hash: bacd65cdd5bac7dffd56f6c9d8f8236b
humanhash: winner-lake-leopard-summer
File name:09021.gz
Download: download sample
Signature Formbook
File size:535'763 bytes
First seen:2021-09-21 11:52:47 UTC
Last seen:Never
File type: gz
MIME type:application/x-rar
ssdeep 12288:cIa964HE7WYzDzDn3zJJ3KilWpq5VAPOSl9+ZC:cRNrYDXn3LaiYeVAPOSH
TLSH T18FB423067EE92ACCC8A32A70F40E30E45667E55930F73E5759896350CD5D823F4EAAE2
Reporter cocaman
Tags:FormBook gz


Avatar
cocaman
Malicious email (T1566.001)
From: "Purchasing < colby.best@tightels.com>" (likely spoofed)
Received: "from slot0.tightels.com (slot0.tightels.com [92.52.218.62]) "
Date: "21 Sep 2021 04:28:40 -0700"
Subject: "NEW ORDER"
Attachment: "09021.gz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-09-21 11:53:08 UTC
AV detection:
7 of 45 (15.56%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:o4ms rat spyware stealer suricata trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Malware Config
C2 Extraction:
http://www.nocodehost.com/o4ms/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

gz daf2171fbf6da5a14b9ac720e3f6a1f75d8d7c1d3e3be02c308ae4faa854eb65

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments