MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb973839df53081c969a7e6647bdfc2d3090b43b496fe8e2244a51a604264112. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: bb973839df53081c969a7e6647bdfc2d3090b43b496fe8e2244a51a604264112
SHA3-384 hash: decb32998c970612a162302bf1d8a56fd4095ca512955ac693ce55d4be182a6fc1dd0557e98bcd0580dc63c3d2eff834
SHA1 hash: 7170ef2a931341c0c4fb152c1552a5049eca68ae
MD5 hash: 0060b9cfb3b239c92f18f3b1ae7d8c3c
humanhash: quebec-enemy-alaska-uranus
File name:invoice.exe
Download: download sample
Signature FormBook
File size:333'824 bytes
First seen:2020-06-08 14:59:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:ImGYzZQBJKK/RI4gLkeLSWIxWyKEjfQ7BYv4OXqqP/n:ImG3XHKSnxXKEjfoBYt7P
Threatray 5'242 similar samples on MalwareBazaar
TLSH 2764020177FDEB36D97E4BF974D724005372313A762AFA5E8DC671E608A2B108A40E67
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: moutaichina.com
Sending IP: 172.93.161.29
From: Mail@moutaichina.com
Reply-To: Ibn.01@outlook.com
Subject: 新命令
Attachment: invoice 1.zip (contains "invoice.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 236613 Sample: ewuTygg1Bw.exe Startdate: 08/06/2020 Architecture: WINDOWS Score: 100 57 www.audreyfarley.com 2->57 59 ext-sq.squarespace.com 2->59 73 Malicious sample detected (through community Yara rule) 2->73 75 Multi AV Scanner detection for dropped file 2->75 77 Multi AV Scanner detection for submitted file 2->77 79 7 other signatures 2->79 11 ewuTygg1Bw.exe 3 2->11         started        signatures3 process4 file5 55 C:\Users\user\AppData\...\ewuTygg1Bw.exe.log, ASCII 11->55 dropped 93 Tries to detect virtualization through RDTSC time measurements 11->93 15 ewuTygg1Bw.exe 11->15         started        signatures6 process7 signatures8 95 Modifies the context of a thread in another process (thread injection) 15->95 97 Maps a DLL or memory area into another process 15->97 99 Sample uses process hollowing technique 15->99 101 Queues an APC in another process (thread injection) 15->101 18 explorer.exe 6 15->18 injected process9 dnsIp10 61 longfellowpurebreds.com 104.219.248.115, 49711, 80 unknown United States 18->61 63 www.longfellowpurebreds.com 18->63 65 www.diamond-distinction.com 18->65 47 C:\Users\user\AppData\Local\...\vgaot707b.exe, PE32 18->47 dropped 81 System process connects to network (likely due to code injection or exploit) 18->81 83 Benign windows process drops PE files 18->83 23 cscript.exe 1 19 18->23         started        27 vgaot707b.exe 3 18->27         started        29 autochk.exe 18->29         started        31 raserver.exe 18->31         started        file11 signatures12 process13 file14 49 C:\Users\user\AppData\...\983logrv.ini, data 23->49 dropped 51 C:\Users\user\AppData\...\983logri.ini, data 23->51 dropped 53 C:\Users\user\AppData\...\983logrf.ini, data 23->53 dropped 85 Detected FormBook malware 23->85 87 Tries to steal Mail credentials (via file access) 23->87 89 Tries to harvest and steal browser information (history, passwords, etc) 23->89 91 3 other signatures 23->91 33 cmd.exe 2 23->33         started        37 cmd.exe 1 23->37         started        39 vgaot707b.exe 27->39         started        signatures15 process16 file17 45 C:\Users\user\AppData\Local\Temp\DB1, SQLite 33->45 dropped 67 Tries to harvest and steal browser information (history, passwords, etc) 33->67 41 conhost.exe 33->41         started        43 conhost.exe 37->43         started        69 Modifies the context of a thread in another process (thread injection) 39->69 71 Maps a DLL or memory area into another process 39->71 signatures18 process19
Gathering data
Threat name:
Win32.PUA.InstallCore
Status:
Malicious
First seen:
2020-06-07 22:38:40 UTC
AV detection:
24 of 31 (77.42%)
Threat level:
  1/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat rezer0 spyware stealer trojan
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
ServiceHost packer
rezer0
Formbook
Malware Config
C2 Extraction:
http://www.joomlas123.com/4vx/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe bb973839df53081c969a7e6647bdfc2d3090b43b496fe8e2244a51a604264112

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments