MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f441732f93fc49899a4978e0bba71bab7cbe3a105394ec1248a55041e204d55a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 5


Intelligence 5 IOCs YARA 19 File information Comments

SHA256 hash: f441732f93fc49899a4978e0bba71bab7cbe3a105394ec1248a55041e204d55a
SHA3-384 hash: 5398d772e1cb0d5813268b7e2113a8f20c19d110f25a967db56f51a865d4c61073b2c0bd5d5374019138e1f7b9a992ce
SHA1 hash: 50496586fceaf49b875888d9c5cc711d6dc2c6bd
MD5 hash: cf2d5c0dae9b027064e70cb276cef630
humanhash: fish-uniform-speaker-muppet
File name:Receipt Copy001pdf.r00
Download: download sample
Signature Formbook
File size:580'419 bytes
First seen:2025-01-28 13:28:18 UTC
Last seen:Never
File type: r00
MIME type:application/x-rar
ssdeep 12288:0HkfHhJO+pG2OZ/T5QZvtQ9wVxUE2gf5ZQzbrogqWtLYk:ckfUem9wVSlgBWzfogqWtLYk
TLSH T129C423B6FA23CDD9C0DC66D4121A8694CF7F69AC80909B61DCA9CF5CA6884385DF074F
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:FormBook payment r00


Avatar
cocaman
Malicious email (T1566.001)
From: "afjal@southeastbank.com.bd" (likely spoofed)
Received: "from [195.211.191.218] (unknown [195.211.191.218]) "
Date: "28 Jan 2025 05:26:50 -0800"
Subject: "RE: Payment Receipt Copy 001"
Attachment: "Receipt Copy001pdf.r00"

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Receipt Copy001.exe
File size:666'624 bytes
SHA256 hash: 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7
MD5 hash: 9ecbdf4d5174c3da835a2a7829e06773
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
shell msil sage
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2025-01-28 08:52:43 UTC
File Type:
Binary (Archive)
Extracted files:
10
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__GlobalFlags
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

r00 f441732f93fc49899a4978e0bba71bab7cbe3a105394ec1248a55041e204d55a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments