MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 410913abf4e31e757643eef79c7252e4c8b046825de18b2ea121d927e9f592e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FormBook
Vendor detections: 5
| SHA256 hash: | 410913abf4e31e757643eef79c7252e4c8b046825de18b2ea121d927e9f592e3 |
|---|---|
| SHA3-384 hash: | 488bd192c00e23781f40013b70e6d170dd0d32604ab4d1f82eaa9e2d3ae262e7df11b2829968e3a93c5d341c4ff1ae4b |
| SHA1 hash: | c4e9bfc56f804a4bad3fe3e451e03d015a29080b |
| MD5 hash: | 4d65c7b4321fe50769884e74342a14c0 |
| humanhash: | mirror-lactose-orange-beer |
| File name: | Invoice.exe |
| Download: | download sample |
| Signature | FormBook |
| File size: | 335'360 bytes |
| First seen: | 2020-05-19 08:06:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d5fad844b2c47cd92aae84559cf2b888 (6 x FormBook) |
| ssdeep | 3072:vpCVtwJoppXBtd53KHZQbYFzhJF14RcBxp7UkVtiv0z4PQ8TvqvXCozOekni1E:8fppXBzYHZQMzzj4RWVV0wpHXDzdki |
| Threatray | 5'126 similar samples on MalwareBazaar |
| TLSH | 50648C22AA5CCEACC53F41767993CD6A8DDD5DF360AF8CA8C178E340C43D681C59A13A |
| Reporter | |
| Tags: | exe FormBook |
abuse_ch
Malspam distributing FormBook:HELO: db9452k-1.ixlhosting.nl
Sending IP: 5.61.253.39
From: Sharon Hsia<eladio@somers.com>
Reply-To: <stoh@hansollvina.com>
Subject: AW:AW:Profoma
Attachment: Invoice.exe
Intelligence
File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Noon
Status:
Malicious
First seen:
2020-05-19 00:15:23 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
21 of 31 (67.74%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
emotet
trickbot
Similar samples:
+ 5'116 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan persistence
Behaviour
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
Suspicious use of UnmapMainImage
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Drops file in Program Files directory
Suspicious use of SetThreadContext
Reads user/profile data of web browsers
Deletes itself
Adds policy Run key to start application
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.mansiobok.info/mm20/
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.