MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 aeba2896821a1bfff2ad0cdc5567445b473fadf42a2de3db8a2ff94438e73fc0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FormBook
Vendor detections: 5
| SHA256 hash: | aeba2896821a1bfff2ad0cdc5567445b473fadf42a2de3db8a2ff94438e73fc0 |
|---|---|
| SHA3-384 hash: | 6373b707bc3756d6ca5791df48f80676872564c62a26d5dfd061ad9f48f08d730928b645d5a54cb8da2763bafc899822 |
| SHA1 hash: | 8237e743385ca9064a3090b3c46fe96d05f9ef35 |
| MD5 hash: | 4ace326d31cddfda65041f63fdf86e92 |
| humanhash: | summer-ohio-california-east |
| File name: | 4ace326d31cddfda65041f63fdf86e92.exe |
| Download: | download sample |
| Signature | FormBook |
| File size: | 358'400 bytes |
| First seen: | 2020-05-18 08:27:44 UTC |
| Last seen: | 2020-05-18 14:30:40 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:BzpLJ96fdxkCNcwamURIWDStPxzjqcOEWA8av4KZitbGBxt2wOynCF7bz83lZ+j:BpLi3uwamURIyStZzWdEG0sg7lZCF7b5 |
| Threatray | 5'294 similar samples on MalwareBazaar |
| TLSH | 8074AD897710B29FC827CD76CAA42C24EA617477570BD343A45325DDAA0EAEBCF111E3 |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
93
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-18 06:17:51 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
22 of 31 (70.97%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 5'284 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.regulars6.com/hx208/
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.