MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6ec516f652708d86ea17dfa8a860550a6be97d1d2c886d67c5bc1e2ad5a2ccd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: e6ec516f652708d86ea17dfa8a860550a6be97d1d2c886d67c5bc1e2ad5a2ccd
SHA3-384 hash: c4c8bf64fe0f4447d49bb477554f4efffda5dcbb8fed81fdc04e3aa75b3835da8b67d31db8a4da9aff67f95b65e8985a
SHA1 hash: ba693834c6f1c079917f49d2fa991195fea01a00
MD5 hash: 6e89c640c74bccc57fa7552e9012ffd1
humanhash: oranges-bakerloo-berlin-batman
File name:R330892136.exe
Download: download sample
Signature FormBook
File size:755'712 bytes
First seen:2020-07-21 06:49:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d8412990f74f880a4a63b66fdb523827 (11 x AgentTesla, 8 x Loki, 5 x FormBook)
ssdeep 12288:+ZnGUxq0RwFvcGHq8TxFsb4mOKKEzem/nfw0GuLKfWBqdW:AGuqtFvm8TxmZlzfffw07KeBr
Threatray 5'355 similar samples on MalwareBazaar
TLSH 62F4AF66F2D00837C167273F9C1B97A5A82ABF5D292499872BF41CCC5F39781383A197
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: zeus.hoswedaje.com
Sending IP: 5.57.226.248
From: comercioexterior@eurotransis.com
Subject: Demande de prix très urgent
Attachment: CDE 18449.zip (contains "R330892136.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
73
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Launching a process
Launching cmd.exe command interpreter
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 248525 Sample: R330892136.exe Startdate: 21/07/2020 Architecture: WINDOWS Score: 100 58 www.godhep.com 2->58 60 Multi AV Scanner detection for domain / URL 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 Multi AV Scanner detection for dropped file 2->64 66 8 other signatures 2->66 11 R330892136.exe 2->11         started        signatures3 process4 signatures5 84 Detected unpacking (changes PE section rights) 11->84 86 Maps a DLL or memory area into another process 11->86 88 Tries to detect virtualization through RDTSC time measurements 11->88 90 Contains functionality to detect sleep reduction / modifications 11->90 14 R330892136.exe 11->14         started        process6 signatures7 92 Modifies the context of a thread in another process (thread injection) 14->92 94 Maps a DLL or memory area into another process 14->94 96 Sample uses process hollowing technique 14->96 98 Queues an APC in another process (thread injection) 14->98 17 explorer.exe 1 6 14->17 injected process8 dnsIp9 52 www.amzbeast.com 23.110.103.3, 49720, 80 LEASEWEB-USA-LAX-11US United States 17->52 54 www.shmla.com 204.11.56.48, 49724, 49725, 49726 CONFLUENCE-NETWORK-INCVG Virgin Islands (BRITISH) 17->54 56 2 other IPs or domains 17->56 42 C:\Users\user\AppData\Local\...\9rxs8w.exe, PE32 17->42 dropped 68 System process connects to network (likely due to code injection or exploit) 17->68 70 Benign windows process drops PE files 17->70 22 control.exe 1 19 17->22         started        26 9rxs8w.exe 17->26         started        28 msiexec.exe 17->28         started        file10 signatures11 process12 file13 44 C:\Users\user\AppData\...\23Plogrv.ini, data 22->44 dropped 46 C:\Users\user\AppData\...\23Plogri.ini, data 22->46 dropped 48 C:\Users\user\AppData\...\23Plogrf.ini, data 22->48 dropped 72 Detected FormBook malware 22->72 74 Tries to steal Mail credentials (via file access) 22->74 76 Tries to harvest and steal browser information (history, passwords, etc) 22->76 78 Modifies the context of a thread in another process (thread injection) 22->78 30 cmd.exe 2 22->30         started        34 cmd.exe 1 22->34         started        80 Maps a DLL or memory area into another process 26->80 36 9rxs8w.exe 26->36         started        82 Tries to detect virtualization through RDTSC time measurements 28->82 signatures14 process15 file16 50 C:\Users\user\AppData\Local\Temp\DB1, SQLite 30->50 dropped 100 Tries to harvest and steal browser information (history, passwords, etc) 30->100 38 conhost.exe 30->38         started        40 conhost.exe 34->40         started        102 Modifies the context of a thread in another process (thread injection) 36->102 104 Maps a DLL or memory area into another process 36->104 106 Sample uses process hollowing technique 36->106 signatures17 process18
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-21 04:28:05 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
evasion trojan spyware stealer family:formbook persistence
Behaviour
Modifies Internet Explorer settings
System policy modification
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Drops file in Program Files directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Deletes itself
Reads user/profile data of web browsers
Adds policy Run key to start application
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe e6ec516f652708d86ea17dfa8a860550a6be97d1d2c886d67c5bc1e2ad5a2ccd

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments