MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e5a94739fb1f6d7a06f6b9eb529037c9ab0d59be424d4b99c63651360d7ded3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 11
| SHA256 hash: | e5a94739fb1f6d7a06f6b9eb529037c9ab0d59be424d4b99c63651360d7ded3f |
|---|---|
| SHA3-384 hash: | b2afa6fe3e90b77573fa0fa183eb9bd25cbdeb3dc5d42bc6fbd1f567bc3acc4ae011c0e1c65d9e5db7c4925a439a07e7 |
| SHA1 hash: | d27a9ae7f310d5072334d971856f290892ceb02b |
| MD5 hash: | 4511b37445308d383f3ca14903c69676 |
| humanhash: | september-north-nineteen-double |
| File name: | specifications & quote request.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 716'800 bytes |
| First seen: | 2020-10-20 08:15:07 UTC |
| Last seen: | 2020-10-26 09:32:50 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger) |
| ssdeep | 12288:tZe0usk2iNwRL9VcWyN7njiaZGnj/Xaqe83KgffJgTq0acdD0Z9LROZUt:teF1SRVlyBjiaEnj/A83KsfEq04Z9A |
| Threatray | 2'582 similar samples on MalwareBazaar |
| TLSH | 96E4E07033F89F65E03E5779447061419FF1A423DB52E6A9BEDD11AE0F627824A33B22 |
| Reporter | |
| Tags: | exe FormBook |
abuse_ch
Malspam distributing Formbook:HELO: spuredgecorp.com
Sending IP: 192.236.160.195
From: M Hanif Azis (malaysia) <Azis.hanif@petronas.com.my>
Reply-To: M Hanif Azis (malaysia) <purchase2@workmail.com>
Subject: quotes request
Attachment: specifications quote request.zip (contains "specifications & quote request.exe")
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
867ec49152a23a8e5ea628a48ec1810db588a716b922e6d1c8e7c45116908d24
a50fdfd2a59cafe23cd41227b465d44b6d00e2b14f707798d60d2637ff78ef25
2fe26662d53b976914fd7bd9fbb589f5bd4114f47753c9437593b29fcd04c236
106bfa0280569ce313c19beb1c68515fb148212a033fdd96ef075d38256f5fb9
c698f5ef823adc2c3079ee359ea6d80e7c8e800d742d8f63c4c6f697131dd763
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_win32_ransom_avaddon_1 |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects Avaddon ransomware |
| Reference: | https://twitter.com/VK_Intel/status/1300944441390370819 |
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.