MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f773778f6eb4e9aa3ab3bd385409acd50081e57aed0e44bbda6308310e8c7316. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 8
| SHA256 hash: | f773778f6eb4e9aa3ab3bd385409acd50081e57aed0e44bbda6308310e8c7316 |
|---|---|
| SHA3-384 hash: | 54fa3a91ae6e662fab55e5f42ce292e577b1e052dbf69776dfde86d54fc32b9de29eb3b2012dea0714d3ffc50e6b4553 |
| SHA1 hash: | 1ddc67d977ef11f31a8c8b7a88fd854a921e3866 |
| MD5 hash: | da9a36b6309b598ebccf383b6263bb65 |
| humanhash: | uncle-cola-alanine-island |
| File name: | da9a36b6309b598ebccf383b6263bb65.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'145'344 bytes |
| First seen: | 2020-11-12 18:11:46 UTC |
| Last seen: | 2024-07-24 23:10:28 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger) |
| ssdeep | 24576:sXZjeRc/vWsHDRpnc5ogKifEvbWCNxxyd3+Yba4mI:sXZjDX5V6SgKhzSjB |
| TLSH | 49355B9D721076EFC85BD462DAA81C68EB60747B831F4213A42755EDEE4D88BCF244F2 |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
5c262eeac56f9ceeb0b44f0b0c46535aa23c3f1317d2c03148648342854fb98c
caed3382f2c691a1a3b7b424c7f00fd3d1bafb3a34f23ee424bcac165b6edf04
f773778f6eb4e9aa3ab3bd385409acd50081e57aed0e44bbda6308310e8c7316
71fa0160ef98f5ebf3f957f156a5368e2010b831e5f5ee618d2e414c29625987
4701e1d0065893d2d05cc0450f8f435e2644299b1beae3d4dd1a9758514d1d6f
dd1b3508cfb8aeb7f9ec8ad9a96bda852f499fb57b8cce55d076e1ce20d89daf
fc616c5cd59810cbfb8418141b2a652b92dd5163a8b9adfa54c79024916f17f2
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Ping_Del_method_bin_mem |
|---|---|
| Author: | James_inthe_box |
| Description: | cmd ping IP nul del |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.