MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dea40a181ad44bb6ba1c49af81a64e27d0ee0e7a825035ba8b2f01e278cc07c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA 8 File information Comments

SHA256 hash: dea40a181ad44bb6ba1c49af81a64e27d0ee0e7a825035ba8b2f01e278cc07c6
SHA3-384 hash: 6f164a2eff04a2dfceb6e158620d16f3638eca6e85d6f6f3ef1a8e69dd91c20e11ea470b3bfd9bc37e805c6672a39ce6
SHA1 hash: 1838028d437303319c30a03502fc749c2619b93e
MD5 hash: 5912321bcf234a3dee1d10f29119bf15
humanhash: hawaii-autumn-blossom-delta
File name:Invoice-2024111.r00
Download: download sample
Signature Formbook
File size:509'071 bytes
First seen:2024-12-10 13:24:04 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 12288:CUPVfPEAk0bBilcw/H9Zw/HuQF+5Wsfk0RVKT74i:VXk0FilX1GgW9qQ7T
TLSH T1C5B42365D289C419CBAA5B9BA766531F07CC0F9C97F08ED3392B78683447AD0B1C06BD
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:FormBook INVOICE r00


Avatar
cocaman
Malicious email (T1566.001)
From: "sue@inchon.cn" (likely spoofed)
Received: "from [154.203.197.208] (unknown [154.203.197.208]) "
Date: "10 Dec 2024 05:23:02 -0800"
Subject: "RE: Invoice-2024111"
Attachment: "Invoice-2024111.r00"

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:eewwe.exe
File size:866'714 bytes
SHA256 hash: 85bc241455361e778dc0d3538562dc5d058bccdcdf025ecd64d03e735fd4aa8f
MD5 hash: 7bb5958bdb772fe2a32c6f843a0fca11
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
autoit emotet
Gathering data
Result
Verdict:
MALICIOUS
Threat name:
Win32.Backdoor.FormBook
Status:
Malicious
First seen:
2024-12-10 12:14:39 UTC
File Type:
Binary (Archive)
Extracted files:
30
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIt
Author:Jean-Philippe Teissier / @Jipe_
Description:AutoIT packer
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

r00 dea40a181ad44bb6ba1c49af81a64e27d0ee0e7a825035ba8b2f01e278cc07c6

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments