MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8894ce53e7e7eee46432f00ee15302fe8bd7aeb9db73416c8047007ac37a5ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e8894ce53e7e7eee46432f00ee15302fe8bd7aeb9db73416c8047007ac37a5ac
SHA3-384 hash: bc88a886eabe10343d5d455a37361ad174912a515897e4f068cb01ee3f4dd979dab77832d551301d1ef2cec2eece8f8b
SHA1 hash: fa9956c1fba84949e7cd84553b8a3db494533a8f
MD5 hash: 8c4211fe0e0ed1810d09cf16d959d8df
humanhash: blue-solar-social-cold
File name:Shipment # 2763 EXW China To LHE.r11
Download: download sample
Signature Formbook
File size:619'362 bytes
First seen:2022-07-07 08:44:03 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:2pJOIdP91/WGXhi6Fl0ux468dg/7fVEegVh0+XbGUKUUToMMclu6PlLFAP7qX:YJZP91/5hvX0uh8di7fVWVhvbtKUUT1j
TLSH T1DED4236B558B9C792605686BFF1D10C6038C3863A6F0FC9F792128D2E14E75D8A94BF2
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:FormBook payment r11 rar Shipping


Avatar
cocaman
Malicious email (T1566.001)
From: "Jamal <ops@velocitylines.co.uk>" (likely spoofed)
Received: "from velocitylines.co.uk (unknown [202.55.133.137]) "
Date: "7 Jul 2022 00:50:25 -0700"
Subject: "FW: Shipping Dox for P.I # 2171-SI / 2172-SI / 2174-SI / 2175-SI / Shipment # 2763 Post Payment//EXW China To LHE"
Attachment: "Shipment # 2763 EXW China To LHE.r11"

Intelligence


File Origin
# of uploads :
1
# of downloads :
180
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2022-07-07 06:50:59 UTC
File Type:
Binary (Archive)
Extracted files:
10
AV detection:
20 of 40 (50.00%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:xloader campaign:pdrq evasion loader persistence rat spyware stealer suricata trojan
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Maps connected drives based on registry
Checks BIOS information in registry
Checks computer location settings
Reads user/profile data of web browsers
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Xloader Payload
Formbook
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

rar e8894ce53e7e7eee46432f00ee15302fe8bd7aeb9db73416c8047007ac37a5ac

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments