MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d4ee1d47b298efcc8475545d1d28ccaf61192def8085636e225019cced7f9cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5d4ee1d47b298efcc8475545d1d28ccaf61192def8085636e225019cced7f9cd
SHA3-384 hash: a6af6cb7d73e88676644d3d377e1c856a06126cf0ebc11465f572fc26e3adce8d43eff2d252488740301548960a7556f
SHA1 hash: 7f6fe33a9c619b59f9a89cca658eafa4cc3d095b
MD5 hash: 816e9673b05e3ea408722a466e272a2a
humanhash: apart-ten-eight-lemon
File name:order pdf.exe
Download: download sample
Signature FormBook
File size:934'914 bytes
First seen:2020-07-06 11:37:07 UTC
Last seen:2020-07-06 13:16:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 75eb72cec9852ec437ead04e43f755c1 (2 x FormBook, 1 x RemcosRAT, 1 x AveMariaRAT)
ssdeep 24576:eA42+toK52YZ574qMPxVPzYMVde9U6thT:eAeT2YEPtcp
Threatray 5'200 similar samples on MalwareBazaar
TLSH 5A159E22B2414877C12254B8EE2F73F45E29BE1119C86C973BF9BD9C5FBA6813817193
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: spock.gnoft.com
Sending IP: 176.9.117.66
From: batam <batam@pmcontrol.com>
Subject: Ri: Ri: Ri: Ri:Ri
Attachment: order pdf.zip (contains "order pdf.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 243504 Sample: dokaz o uplati.exe Startdate: 06/07/2020 Architecture: WINDOWS Score: 100 40 www.rokutechnosupport.online 2->40 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 Yara detected FormBook 2->52 54 3 other signatures 2->54 9 dokaz o uplati.exe 16 2->9         started        signatures3 process4 dnsIp5 42 googlehosted.l.googleusercontent.com 172.217.18.161, 443, 49715 GOOGLEUS United States 9->42 44 doc-14-bs-docs.googleusercontent.com 9->44 64 Writes to foreign memory regions 9->64 66 Allocates memory in foreign processes 9->66 68 Creates a thread in another existing process (thread injection) 9->68 70 Injects a PE file into a foreign processes 9->70 13 ieinstal.exe 9->13         started        signatures6 process7 signatures8 72 Modifies the context of a thread in another process (thread injection) 13->72 74 Maps a DLL or memory area into another process 13->74 76 Sample uses process hollowing technique 13->76 78 Queues an APC in another process (thread injection) 13->78 16 explorer.exe 3 13->16 injected process9 dnsIp10 34 moodandmystery.com 192.0.78.196, 49720, 49721, 49722 AUTOMATTICUS United States 16->34 36 www.rokutechnosupport.online 16->36 38 2 other IPs or domains 16->38 46 System process connects to network (likely due to code injection or exploit) 16->46 20 cmmon32.exe 1 18 16->20         started        24 ieinstal.exe 16->24         started        26 ieinstal.exe 16->26         started        signatures11 process12 file13 28 C:\Users\user\AppData\...\80Alogrv.ini, data 20->28 dropped 30 C:\Users\user\AppData\...\80Alogri.ini, data 20->30 dropped 32 C:\Users\user\AppData\...\80Alogrf.ini, data 20->32 dropped 56 Detected FormBook malware 20->56 58 Tries to steal Mail credentials (via file access) 20->58 60 Tries to harvest and steal browser information (history, passwords, etc) 20->60 62 3 other signatures 20->62 signatures14
Threat name:
Win32.Trojan.Formbook
Status:
Malicious
First seen:
2020-07-06 10:17:08 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence spyware
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Adds Run entry to policy start application
Adds Run entry to policy start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 5d4ee1d47b298efcc8475545d1d28ccaf61192def8085636e225019cced7f9cd

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments