MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dccd1cdb73b3ea0e4a003f09972055cd5c780467ab3393defbcb442328108b4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA 10 File information Comments

SHA256 hash: dccd1cdb73b3ea0e4a003f09972055cd5c780467ab3393defbcb442328108b4c
SHA3-384 hash: 25f174aedc25c5df902f48585894ba092076ca604aa4e8e81b17ed3868730fb5b6a33cc9a203067e2c9e99ffd4eedc92
SHA1 hash: 4d99f2650b4ad18a0412b2585004d41d272b92c2
MD5 hash: ddb0ee0c952e9b727fa6f891b1f84e92
humanhash: west-georgia-montana-oscar
File name:COMMECAIL INVOICE AND TNT AWB TRACKING DETAILS.PDF.zip
Download: download sample
Signature Formbook
File size:760'262 bytes
First seen:2025-04-25 12:12:26 UTC
Last seen:2025-04-25 14:02:11 UTC
File type: zip
MIME type:application/zip
ssdeep 12288:PNa/IU5ILjnigqS5q8o8Kj6vExJW3V5xHeF+deYs5rm2oR+GF5EzYAdQwCWZVVrw:PNsIj3SKoPxcS/YZnRdkImF6
TLSH T14BF4337789065BF962F9E83C0A02164335561594F33E6DAAE496FC2EF80C2E707D2DE1
Magika zip
Reporter cocaman
Tags:DHL FormBook INVOICE TNT zip


Avatar
cocaman
Malicious email (T1566.001)
From: "TNT OFFICE <dhl@geprojectoman.com>" (likely spoofed)
Received: "from serene-yalow.176-100-37-251.plesk.page (unknown [176.100.37.251]) "
Date: "Fri, 25 Apr 2025 12:48:03 +0100"
Subject: "RE : TNT Express //Arrival Notice // AWB #87013580 04/25/2025"
Attachment: "COMMECAIL INVOICE AND TNT AWB TRACKING DETAILS.PDF.zip"

Intelligence


File Origin
# of uploads :
2
# of downloads :
602
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:COMMECAIL INVOICE AND TNT AWB TRACKING DETAILS.exe
File size:859'648 bytes
SHA256 hash: f99cf9f643c2e4d0517b48a35721b6b6df1feb97895c476650f3364d55fbc77c
MD5 hash: 5b36654061a8756b1ba577874304a004
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
micro spawn shell
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
entropy masquerade obfuscated obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-04-25 07:59:49 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip dccd1cdb73b3ea0e4a003f09972055cd5c780467ab3393defbcb442328108b4c

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments