MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8e0003e4f6d537153e60ac5129859a33b57b3b9a36b7d2be62273a6b3a8d5f3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8e0003e4f6d537153e60ac5129859a33b57b3b9a36b7d2be62273a6b3a8d5f3f
SHA3-384 hash: 3ec42fb7398fa98f6652347be5898346b58929a5cc7d7685fc766f2d0d2b50e55f9f05f800a7b12016e0ec2643b6229f
SHA1 hash: 33c1ff8589faf0c2469a33131fcdffb01547dab0
MD5 hash: e2a5e6e8c1448dfcaf7ae95dff95ade9
humanhash: item-oranges-mango-seventeen
File name:URGENT-RFQ6532-JUNE2020.exe
Download: download sample
Signature Formbook
File size:646'144 bytes
First seen:2020-06-11 06:13:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:HSuu5ExOV2h+V13m5bY+xyQvojokb/JpTA:HtyEwVyI13mxT+oJ
Threatray 5'517 similar samples on MalwareBazaar
TLSH F4D4050761BDE9DAF62E7DB1451617105AB06D622A36E243DC8F3DC9D43BB83CA406CB
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing Formbook:

HELO: sungwon7.co
Sending IP: 111.90.158.36
From: Hari Khalsa <vonploetz@hannover-marketing.de>
Reply-To: david@kelichna.com
Subject: Re :KN95 MASK -SURGICAL MASK, NITRILE GLOVES URGENTLY NEEEDED
Attachment: URGENT-RFQ6532-JUNE2020.rar (contains "URGENT-RFQ6532-JUNE2020.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 237751 Sample: druS9vVaUK.exe Startdate: 11/06/2020 Architecture: WINDOWS Score: 100 48 Multi AV Scanner detection for domain / URL 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 6 other signatures 2->54 10 druS9vVaUK.exe 3 2->10         started        process3 file4 40 C:\Users\user\AppData\...\druS9vVaUK.exe.log, ASCII 10->40 dropped 68 Detected unpacking (changes PE section rights) 10->68 70 Detected unpacking (overwrites its own PE header) 10->70 72 Tries to detect virtualization through RDTSC time measurements 10->72 74 Injects a PE file into a foreign processes 10->74 14 druS9vVaUK.exe 10->14         started        signatures5 process6 signatures7 76 Modifies the context of a thread in another process (thread injection) 14->76 78 Maps a DLL or memory area into another process 14->78 80 Sample uses process hollowing technique 14->80 82 Queues an APC in another process (thread injection) 14->82 17 explorer.exe 4 6 14->17 injected process8 dnsIp9 42 www.isolb.net 209.99.64.55, 49711, 80 unknown United States 17->42 44 www.flycoz.com 63.250.42.84, 49712, 49713, 49714 unknown United States 17->44 46 www.qdbfqfphjidqgtbttnq.com 17->46 32 C:\Users\user\AppData\...\axh0nv7nt03do.exe, PE32 17->32 dropped 56 System process connects to network (likely due to code injection or exploit) 17->56 58 Benign windows process drops PE files 17->58 22 NETSTAT.EXE 1 18 17->22         started        26 axh0nv7nt03do.exe 2 17->26         started        file10 signatures11 process12 file13 34 C:\Users\user\AppData\...\940logrv.ini, data 22->34 dropped 36 C:\Users\user\AppData\...\940logri.ini, data 22->36 dropped 38 C:\Users\user\AppData\...\940logrf.ini, data 22->38 dropped 60 Detected FormBook malware 22->60 62 Tries to steal Mail credentials (via file access) 22->62 64 Tries to harvest and steal browser information (history, passwords, etc) 22->64 66 3 other signatures 22->66 28 cmd.exe 1 22->28         started        signatures14 process15 process16 30 conhost.exe 28->30         started       
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-06-11 03:45:45 UTC
AV detection:
23 of 31 (74.19%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of UnmapMainImage
Drops file in Program Files directory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.flycoz.com/te/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 8e0003e4f6d537153e60ac5129859a33b57b3b9a36b7d2be62273a6b3a8d5f3f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments