MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6678b91ffc7bf3cd0b4624d6f8a3a500d666fd023e43d79727ddd29bd5a7ac19. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 6678b91ffc7bf3cd0b4624d6f8a3a500d666fd023e43d79727ddd29bd5a7ac19
SHA3-384 hash: 7afa317ca954c50a17705e722b44f550e258a05424727f46855990c9a8b0e761b0377ac46d1d410527805d491b04c90b
SHA1 hash: bd0db0608bbcf3221c8081998dface06711616e3
MD5 hash: 1292f91d4da023061c50d6ba12d0e033
humanhash: alabama-failed-king-lactose
File name:tt.exe
Download: download sample
Signature FormBook
File size:279'552 bytes
First seen:2020-07-20 19:25:04 UTC
Last seen:2020-07-20 19:48:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:qbBFktif4MXfoeJJdoT608Ug35/IFhUd46TpcZ:qctif44ffJUli5/IFhUd4P
Threatray 4'520 similar samples on MalwareBazaar
TLSH A054D097B3A74E17C2AE817CF4704E09073166292532F74D7D9C74A636023E685AA37F
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 248365 Sample: tt.exe Startdate: 21/07/2020 Architecture: WINDOWS Score: 100 61 www.phyterfacial.com 2->61 77 Malicious sample detected (through community Yara rule) 2->77 79 Antivirus / Scanner detection for submitted sample 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 4 other signatures 2->83 11 tt.exe 2 2->11         started        signatures3 process4 file5 53 C:\Users\user\AppData\Local\...\tt.exe.log, ASCII 11->53 dropped 91 Maps a DLL or memory area into another process 11->91 93 Sample uses process hollowing technique 11->93 15 RegAsm.exe 11->15         started        18 RegAsm.exe 11->18         started        20 cmd.exe 1 11->20         started        signatures6 process7 signatures8 95 Modifies the context of a thread in another process (thread injection) 15->95 97 Maps a DLL or memory area into another process 15->97 99 Sample uses process hollowing technique 15->99 101 Queues an APC in another process (thread injection) 15->101 22 explorer.exe 1 6 15->22 injected 103 Tries to detect virtualization through RDTSC time measurements 18->103 27 conhost.exe 20->27         started        29 choice.exe 1 20->29         started        process9 dnsIp10 63 10076.searchmagnified.com 209.99.64.76, 49720, 80 CONFLUENCE-NETWORK-INCVG United States 22->63 65 www.rennahynesteam.com 22->65 67 2 other IPs or domains 22->67 51 C:\Users\user\AppData\Local\...\chlm4-.exe, PE32 22->51 dropped 87 System process connects to network (likely due to code injection or exploit) 22->87 89 Benign windows process drops PE files 22->89 31 raserver.exe 1 19 22->31         started        35 chlm4-.exe 2 22->35         started        file11 signatures12 process13 file14 55 C:\Users\user\AppData\...555-logrv.ini, data 31->55 dropped 57 C:\Users\user\AppData\...575-logri.ini, data 31->57 dropped 59 C:\Users\user\AppData\...595-logrf.ini, data 31->59 dropped 69 Detected FormBook malware 31->69 71 Tries to steal Mail credentials (via file access) 31->71 73 Tries to harvest and steal browser information (history, passwords, etc) 31->73 75 3 other signatures 31->75 37 cmd.exe 2 31->37         started        41 cmd.exe 1 31->41         started        43 conhost.exe 35->43         started        signatures15 process16 file17 49 C:\Users\user\AppData\Local\Temp\DB1, SQLite 37->49 dropped 85 Tries to harvest and steal browser information (history, passwords, etc) 37->85 45 conhost.exe 37->45         started        47 conhost.exe 41->47         started        signatures18 process19
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-07-20 19:24:50 UTC
File Type:
PE (.Net Exe)
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
persistence trojan spyware stealer family:formbook evasion
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
System policy modification
Enumerates system info in registry
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Modifies Internet Explorer settings
Suspicious use of SendNotifyMessage
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Reads user/profile data of web browsers
Deletes itself
Adds policy Run key to start application
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments