MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc934dec8fef973cbadcead0007e6847f6771c3e2852e8e866902ec77e1630b3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: dc934dec8fef973cbadcead0007e6847f6771c3e2852e8e866902ec77e1630b3
SHA3-384 hash: 0e3c82655f2120c73cda1f24851d7cebe9c58274448c1d2d8714bc065c1b23499cdeba92a3f997570c5890bcf18e4737
SHA1 hash: 8b62bd57c3895d8a796ec0d4f0bb76c8f524c9a9
MD5 hash: 72bbadaf3aae49829447214a1ab819fc
humanhash: charlie-august-tango-white
File name:Ultratech Alfa PO NO.333.rar
Download: download sample
Signature Formbook
File size:236'446 bytes
First seen:2023-08-02 09:18:44 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:qGAClGISy/bv80lW+DqJMqWaMEKX2Fia9e4TX:rc5JEeJKzF2Fp
TLSH T1373423E048C56E794C248693063E29E767A3B986B3A3DFD153F4237E768BC2509C3E15
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook rar


Avatar
cocaman
Malicious email (T1566.001)
From: "Purchase Dept <purchase@unnatti.in>" (likely spoofed)
Received: "from [37.139.129.109] (unknown [37.139.129.109]) "
Date: "2 Aug 2023 11:17:50 +0200"
Subject: "Purchase Order Ultratech Alfa"
Attachment: "Ultratech Alfa PO NO.333.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Ultratech Alfa PO NO.333.exe
File size:252'285 bytes
SHA256 hash: 190090b95e7c9b2410ceb2149bb1c4369550963e56693e331bda3d020a0018e2
MD5 hash: f43da80652fdc28d625bc4a8023743a0
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control lolbin masquerade overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-08-02 09:11:29 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:sn26 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Deletes itself
Loads dropped DLL
Formbook payload
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar dc934dec8fef973cbadcead0007e6847f6771c3e2852e8e866902ec77e1630b3

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments