MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee5f89131e85132d14a0cfd2cec62c7c21a845f2c02ef08bda36c6fbd7847526. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: ee5f89131e85132d14a0cfd2cec62c7c21a845f2c02ef08bda36c6fbd7847526
SHA3-384 hash: c1e7189ec0c16edc2859751f5ddd7dac32831c50bca0e410259024520f3a4f267be9aa9e5268ea6087776d66b7cc6565
SHA1 hash: 243f4222d24c38167edc1a591612c1e06bfbce8d
MD5 hash: 6c8bbe84542c45ea41d97690e5bc4095
humanhash: missouri-washington-papa-speaker
File name:PRE ALERT NOTICE.zip
Download: download sample
Signature Formbook
File size:600'986 bytes
First seen:2023-01-05 10:02:01 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:ABd5w3J79e1WSOxuS6Yt8InDMNNRqHuLGZv+AQs3WnY9B0YX1gz2HpDsG:ATGZReE7ut7IINLuuiEAQ6n12ap
TLSH T1EAD433577538C5AFAB1EE4D42A033C794C6B02459D3CAA1246FCA1694B4E436DFF08AF
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:FormBook Shipping zip


Avatar
cocaman
Malicious email (T1566.001)
From: "mkt5@wincologistics.com" (likely spoofed)
Received: "from [103.232.53.48] (unknown [103.232.53.48]) "
Date: "4 Jan 2023 13:33:56 -0800"
Subject: "RE:SHIPPING DOC (CI,COO,PL,BL)"
Attachment: "PRE ALERT NOTICE.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:PRE ALERT NOTICE.exe
File size:1'258'496 bytes
SHA256 hash: 36f828fc51e022714a6fd634e6b663919f332b67e9505ceb05d5c3b9398c6a00
MD5 hash: 9190513275b80db066cc1a2275c01af1
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2023-01-04 17:58:00 UTC
File Type:
Binary (Archive)
Extracted files:
3
AV detection:
9 of 26 (34.62%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Uses the VBS compiler for execution
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip ee5f89131e85132d14a0cfd2cec62c7c21a845f2c02ef08bda36c6fbd7847526

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments