MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc758276ceeacab79a2a2959453c15c5ed7567186cd09a2958204efa2d371de4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA 9 File information Comments

SHA256 hash: dc758276ceeacab79a2a2959453c15c5ed7567186cd09a2958204efa2d371de4
SHA3-384 hash: 4e69e701669a68e2c4f37b7900156d0971cff3bb606d98f02d88d612dbfaed38ef36f7ef208436bf5e67c7c9dc327e2f
SHA1 hash: c3f87bfb8acece44f615f3b124bf1850eb010d9f
MD5 hash: 6e56c2c9be61c05923ed6308bb783a93
humanhash: alpha-jersey-uranus-dakota
File name:AWB 5443224.r00
Download: download sample
Signature Formbook
File size:506'602 bytes
First seen:2025-01-02 12:51:10 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 12288:cUPVfPEAk0bBilcw/H9ZEtHnHUcUcdraDEgoekP7J:/Xk0FilX1iH0cp9+RPkV
TLSH T1EDB42335816E420D8BE76F5BE962D305D0E46D876A739ECBB023304A6C13B76F27216C
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:FormBook r00


Avatar
cocaman
Malicious email (T1566.001)
From: "gopi@alangroups.com" (likely spoofed)
Received: "from [154.203.197.208] (unknown [154.203.197.208]) "
Date: "19 Dec 2024 00:00:54 -0800"
Subject: "RE: Confirm shipment details FOR AWB 5443224"
Attachment: "AWB 5443224.r00"

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:sggii.exe
File size:864'352 bytes
SHA256 hash: 4672f0638e704fe1fcf9b905b3f87677f2158a24c6a924d6540101d181780b1e
MD5 hash: 1a330ea2c1b274736cc9cd1ad4d58011
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
phishing autoit emotet
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2024-12-19 06:34:38 UTC
File Type:
Binary (Archive)
Extracted files:
30
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIt
Author:Jean-Philippe Teissier / @Jipe_
Description:AutoIT packer
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

r00 dc758276ceeacab79a2a2959453c15c5ed7567186cd09a2958204efa2d371de4

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments