MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4844f86de461d882aa8fba67fe579696bb68e5a5a02d725b2bd9732101f86966. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4844f86de461d882aa8fba67fe579696bb68e5a5a02d725b2bd9732101f86966
SHA3-384 hash: 065d27d8f8a389b367bee04b9d32fc612484ee285f7583a6f08628819e7bafc79cb15cce26c2949a14beea78011b6ce9
SHA1 hash: ecae724d479f576e52427220acee261e943ddf96
MD5 hash: c53846c2fb17b0371e5ea694c7131a6b
humanhash: fish-fruit-earth-green
File name:yafucqd.msi.exe
Download: download sample
Signature FormBook
File size:678'912 bytes
First seen:2020-07-01 19:11:42 UTC
Last seen:2020-07-01 19:49:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4b522d1337a03224b843b6d2e54f5f21 (2 x AveMariaRAT, 2 x FormBook, 1 x RemcosRAT)
ssdeep 12288:KsGedX0ZE/lT+YhK6Aosb3zvIje3qBrJCSuAsofYM5PajSak:jfmZ6x+WHhi3zAxfCSuAsIYMB
Threatray 5'273 similar samples on MalwareBazaar
TLSH D0E48E22B690C437C07619389D0BBBF45936BD10AEE4A9873BE87D4C5F34A913939397
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Exploit.BypassUac
Status:
Malicious
First seen:
2020-07-01 14:11:37 UTC
File Type:
PE (Exe)
Extracted files:
53
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence spyware
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious behavior: EnumeratesProcesses
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments