MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0618ad213a6ce0e3dcaa65f80e4379953c38f97dbeccad081b5decc1dce38849. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 0618ad213a6ce0e3dcaa65f80e4379953c38f97dbeccad081b5decc1dce38849
SHA3-384 hash: cbe6e0f2259d0e6c6e8533ca67cc736399784bb7e46658de6ad88c951233ed34609ccd6e12482a93b5267ebdc1a35bb5
SHA1 hash: 36696bf0da5c4d6bb751018182648fc16e46d79a
MD5 hash: 99ec724b02038cb9afa938c61bf0c4d5
humanhash: sink-florida-grey-muppet
File name:inxx.exe
Download: download sample
Signature Formbook
File size:421'888 bytes
First seen:2021-01-12 22:45:01 UTC
Last seen:2021-01-13 01:01:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6d78c203697582a336c7a0a9d7775a1b (5 x Formbook, 1 x RemcosRAT, 1 x AgentTesla)
ssdeep 12288:sXMXFUsgEz3KHuhwZdplDl56m8KEJopKXoaRn6m:s8XyxEz8pl56mdEJopI0m
Threatray 257 similar samples on MalwareBazaar
TLSH 38947D26B7D8F6AAD18144B97209FFA640513C34292EC843F7C17B5B38725EE9606F1B
Reporter Racco42
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 338854 Sample: inxx.exe Startdate: 12/01/2021 Architecture: WINDOWS Score: 80 19 Found malware configuration 2->19 21 Malicious sample detected (through community Yara rule) 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 2 other signatures 2->25 7 inxx.exe 1 2->7         started        process3 signatures4 27 Maps a DLL or memory area into another process 7->27 10 inxx.exe 7->10         started        12 conhost.exe 7->12         started        process5 process6 14 WerFault.exe 24 9 10->14         started        file7 17 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 14->17 dropped
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2021-01-04 17:57:07 UTC
AV detection:
37 of 46 (80.43%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.besthandstool.icu/uds2/
Unpacked files
SH256 hash:
0618ad213a6ce0e3dcaa65f80e4379953c38f97dbeccad081b5decc1dce38849
MD5 hash:
99ec724b02038cb9afa938c61bf0c4d5
SHA1 hash:
36696bf0da5c4d6bb751018182648fc16e46d79a
SH256 hash:
4d61b7ecb6a8b877d09838cb802c0b61e7a8e054bf2ef28a409fdb42810486d4
MD5 hash:
07bde13f833523a789ec8272ef524d06
SHA1 hash:
c61a693f1f137f0f13c09273e79f65d37b395757
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
96780ec9db13ea9c583ae3f70775d65cc521583642fcceb1cda226ac658d0fc4
MD5 hash:
fc848c305850f579606108594e4f5316
SHA1 hash:
7189d742820b68c8f3f5b84ac3f3c911535ca10a
Detections:
win_formbook_g0 win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 0618ad213a6ce0e3dcaa65f80e4379953c38f97dbeccad081b5decc1dce38849

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments