MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8afd54f2ed0af6d9593b0985cec1604748ca753900859fe4ee225d21b574e55e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8afd54f2ed0af6d9593b0985cec1604748ca753900859fe4ee225d21b574e55e
SHA3-384 hash: 87a9f3f89d5d902e484f1900b5be7200269414d9661d8a22f572ccf41cb783b991c25c27fcb02cef17604822a0f6c77d
SHA1 hash: c0b524bf9180fc3dbae0e8c72b96fd8c0ddf6e02
MD5 hash: e7ec2585b8fd04839c9d29fbaf35b6fc
humanhash: bluebird-single-december-skylark
File name:SecuriteInfo.com.BScope.Backdoor.Remcos.948
Download: download sample
Signature Formbook
File size:559'616 bytes
First seen:2020-07-09 13:43:30 UTC
Last seen:2020-07-24 21:59:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9a50e73bc75a3005fac729605bdf4c02 (3 x FormBook, 3 x RemcosRAT, 2 x AveMariaRAT)
ssdeep 12288:Pvldw9ecty5wgPvh3NQFoVvVLrkX6dtOFRlAPB3zBKzq:nfw9DKth3NQFoDLrkXgtYRlAPlz8
Threatray 5'414 similar samples on MalwareBazaar
TLSH F0C48F72F2D08937D12F1A79CD1B96A8583ABE103D28DC8A7BF52D4C5F39651343A1A3
Reporter SecuriteInfoCom
Tags:FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Exploit.BypassUac
Status:
Malicious
First seen:
2020-07-09 07:27:23 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Modifies Internet Explorer settings
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Adds Run entry to start application
Legitimate hosting services abused for malware hosting/C2
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Adds Run entry to policy start application
Adds Run entry to policy start application
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments