MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5845f8c6a360994b9315ad2e8abbb041a55f4653b6dfc704730202e8c8caf692. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 5845f8c6a360994b9315ad2e8abbb041a55f4653b6dfc704730202e8c8caf692
SHA3-384 hash: 940268e88a096d828e6859ac7cf385d404d09e7a79306bb187282310095504fefb496358329d49f689455c2a090597c9
SHA1 hash: e09198299fa4f4858e4a6c53d5f02e03ebd546f4
MD5 hash: 6412e813fe142994b2eb90a59e3985a2
humanhash: delta-sierra-finch-yellow
File name:MV PARADISE_pdf.exe
Download: download sample
Signature FormBook
File size:630'784 bytes
First seen:2020-07-20 07:40:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 18cb1753a10ac437b1e45b0361d426a6 (5 x AgentTesla, 3 x MassLogger, 3 x NanoCore)
ssdeep 12288:BRkDC2ugt0FPWW049gyUeGTOiCERxU7TzHjDcw1HJYPlBsf87wI3v9w:BSGE0FpCqi/Uv7XP5JYPDC2//
Threatray 5'138 similar samples on MalwareBazaar
TLSH BCD4AE66F2E08433C1623A7B9C5B57B4A83ABF9C3D2859472BE85DCC5F387423459293
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: linux887.grserver.gr
Sending IP: 185.4.133.240
From: Cara Shipping Pte. Limited <shipping@carashipping.com.sg>
Reply-To: shipping@carashipping.com.sg
Subject: MV PARADISE - Spare Parts Request
Attachment: MV PARADISE.pdf.arj (contains "MV PARADISE_pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file in the %temp% subdirectories
Reading critical registry keys
Creating a file
Deleting a recently created file
Reading Telegram data
Running batch commands
Creating a process with a hidden window
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 247613 Sample: MV PARADISE_pdf.exe Startdate: 20/07/2020 Architecture: WINDOWS Score: 100 51 Malicious sample detected (through community Yara rule) 2->51 53 Multi AV Scanner detection for dropped file 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 9 other signatures 2->57 10 MV PARADISE_pdf.exe 2->10         started        process3 signatures4 71 Maps a DLL or memory area into another process 10->71 13 MV PARADISE_pdf.exe 10->13         started        process5 signatures6 75 Modifies the context of a thread in another process (thread injection) 13->75 77 Maps a DLL or memory area into another process 13->77 79 Sample uses process hollowing technique 13->79 81 Queues an APC in another process (thread injection) 13->81 16 explorer.exe 1 6 13->16 injected process7 dnsIp8 45 s-475536.gotocdn.com 103.43.191.55, 49739, 49740, 49741 WEST263GO-HKWest263InternationalLimitedHK Singapore 16->45 47 www.selmaspa.net 212.123.41.108, 49735, 80 EPAG-ASDE Germany 16->47 49 2 other IPs or domains 16->49 35 C:\Users\user\AppData\Local\...\qz7x2kder.exe, PE32 16->35 dropped 59 System process connects to network (likely due to code injection or exploit) 16->59 61 Benign windows process drops PE files 16->61 21 wscript.exe 1 19 16->21         started        file9 signatures10 process11 file12 37 C:\Users\user\AppData\...\-64logrv.ini, data 21->37 dropped 39 C:\Users\user\AppData\...\-64logri.ini, data 21->39 dropped 41 C:\Users\user\AppData\...\-64logrf.ini, data 21->41 dropped 63 Detected FormBook malware 21->63 65 Tries to steal Mail credentials (via file access) 21->65 67 Tries to harvest and steal browser information (history, passwords, etc) 21->67 69 3 other signatures 21->69 25 cmd.exe 2 21->25         started        29 cmd.exe 1 21->29         started        signatures13 process14 file15 43 C:\Users\user\AppData\Local\Temp\DB1, SQLite 25->43 dropped 73 Tries to harvest and steal browser information (history, passwords, etc) 25->73 31 conhost.exe 25->31         started        33 conhost.exe 29->33         started        signatures16 process17
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-20 00:58:22 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware persistence
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Modifies Internet Explorer settings
Suspicious use of AdjustPrivilegeToken
System policy modification
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Drops file in Program Files directory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Deletes itself
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Adds policy Run key to start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 5845f8c6a360994b9315ad2e8abbb041a55f4653b6dfc704730202e8c8caf692

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments