MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77be23825e937be7c4e100dd70233848523702b85fe2c5e622aa383748ac8e8a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 77be23825e937be7c4e100dd70233848523702b85fe2c5e622aa383748ac8e8a
SHA3-384 hash: 1b2d534e9801d67e28d3be9855486817c6590b0d6c2ff6e7810904bfe9b17fe5fbaccff995202894bb5b66bbb963ad4d
SHA1 hash: 8a411ce20faa09904dd6c511ff8fab219b487fe4
MD5 hash: b6eb4936bc2815d1fd93ef63a1d7012d
humanhash: echo-tennessee-failed-island
File name:Inquiry (2).exe
Download: download sample
Signature FormBook
File size:817'664 bytes
First seen:2020-07-20 09:21:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:1OEX1q9I6/kVdSC0Dycod+ik4g8ylSoDJ2TmFOwiPVMg:1OEXudWYrE3oDoTmFPi6g
Threatray 5'419 similar samples on MalwareBazaar
TLSH E105E0C99AA04400DDED6FB55E628EB54731BC41F8F1D30F1BC4B9AA2A7B793D414722
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: diatech-uae.pw
Sending IP: 104.168.135.164
From: diatech-uae.pw <lr@diatech-uae.pw>
Reply-To: roadtriip25@gmail.com
Subject: Inquiry 6000239014-P52
Attachment: Inquiry 2.gz (contains "Inquiry (2).exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 247969 Sample: Inquiry (2).exe Startdate: 20/07/2020 Architecture: WINDOWS Score: 100 66 Malicious sample detected (through community Yara rule) 2->66 68 Multi AV Scanner detection for dropped file 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 6 other signatures 2->72 10 Inquiry (2).exe 3 2->10         started        process3 file4 52 C:\Users\user\AppData\...\Inquiry (2).exe.log, ASCII 10->52 dropped 86 Injects a PE file into a foreign processes 10->86 14 Inquiry (2).exe 10->14         started        17 Inquiry (2).exe 10->17         started        19 Inquiry (2).exe 10->19         started        21 Inquiry (2).exe 10->21         started        signatures5 process6 signatures7 100 Modifies the context of a thread in another process (thread injection) 14->100 102 Maps a DLL or memory area into another process 14->102 104 Sample uses process hollowing technique 14->104 106 Queues an APC in another process (thread injection) 14->106 23 explorer.exe 1 6 14->23 injected process8 dnsIp9 60 kk2288.net 154.85.141.230, 49735, 80 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 23->60 62 www.xn--jlq4ip57kx6m.com 23->62 64 2 other IPs or domains 23->64 50 C:\Users\user\AppData\...\ub_x8ds8kpxhbz.exe, PE32 23->50 dropped 82 System process connects to network (likely due to code injection or exploit) 23->82 84 Benign windows process drops PE files 23->84 28 help.exe 1 19 23->28         started        32 ub_x8ds8kpxhbz.exe 3 23->32         started        34 systray.exe 23->34         started        file10 signatures11 process12 file13 54 C:\Users\user\AppData\...\OK-logrv.ini, data 28->54 dropped 56 C:\Users\user\AppData\...\OK-logri.ini, data 28->56 dropped 58 C:\Users\user\AppData\...\OK-logrf.ini, data 28->58 dropped 88 Detected FormBook malware 28->88 90 Tries to steal Mail credentials (via file access) 28->90 92 Tries to harvest and steal browser information (history, passwords, etc) 28->92 98 2 other signatures 28->98 36 cmd.exe 2 28->36         started        40 cmd.exe 1 28->40         started        94 Injects a PE file into a foreign processes 32->94 42 ub_x8ds8kpxhbz.exe 32->42         started        96 Tries to detect virtualization through RDTSC time measurements 34->96 signatures14 process15 file16 48 C:\Users\user\AppData\Local\Temp\DB1, SQLite 36->48 dropped 74 Tries to harvest and steal browser information (history, passwords, etc) 36->74 44 conhost.exe 36->44         started        46 conhost.exe 40->46         started        76 Modifies the context of a thread in another process (thread injection) 42->76 78 Maps a DLL or memory area into another process 42->78 80 Sample uses process hollowing technique 42->80 signatures17 process18
Threat name:
ByteCode-MSIL.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-20 09:23:06 UTC
AV detection:
38 of 48 (79.17%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
persistence spyware evasion trojan stealer family:formbook
Behaviour
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Reads user/profile data of web browsers
Deletes itself
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 77be23825e937be7c4e100dd70233848523702b85fe2c5e622aa383748ac8e8a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments