MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f6a1cf040ecee307e3e5289f73b27664e33db21aaac5142e89b2a956934ae0c9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | f6a1cf040ecee307e3e5289f73b27664e33db21aaac5142e89b2a956934ae0c9 |
|---|---|
| SHA3-384 hash: | 8b814625c9e6c4468b1cce3e3435486f76396cb254ee58051b28d901540dab2b6f1e8262ea30798e43980b135ff57af3 |
| SHA1 hash: | 427ad90e6f9e40c447a66dedb344c788764cbf92 |
| MD5 hash: | b074bc8cc313c6fcafe448ae189de963 |
| humanhash: | red-illinois-cat-don |
| File name: | PO210119.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'600'000 bytes |
| First seen: | 2021-01-19 07:54:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'747 x AgentTesla, 19'638 x Formbook, 12'244 x SnakeKeylogger) |
| ssdeep | 24576:8hpTni/0TWIGsPgYUGwirx6FklAAaYknY:8zi/m17gYUnyIilAAa |
| Threatray | 3'550 similar samples on MalwareBazaar |
| TLSH | 4975F6993650B6DFC857CE368A681D60EBA0747A430BE303A05355EDDE4EA9BDF140F2 |
| Reporter | |
| Tags: | exe FormBook geo KOR |
abuse_ch
Malspam distributing Formbook:HELO: mail-smail-vm44.hanmail.net
Sending IP: 203.133.180.232
From: 아이구주 <guju@iguju.com>
Subject: 견적문의 드립니다.(권성록 입니다.)
Attachment: PO0170-PF3F-21-01-192T.cab (contains "PO210119.exe")
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_win32_ransom_avaddon_1 |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects Avaddon ransomware |
| Reference: | https://twitter.com/VK_Intel/status/1300944441390370819 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.