MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0c6823e63b28799c28145805bc2c143c67a52698e4af497070b9da8439d6b327. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | 0c6823e63b28799c28145805bc2c143c67a52698e4af497070b9da8439d6b327 |
|---|---|
| SHA3-384 hash: | e0b2eb7b1449bcd59721065634a839f1d5f31b56b081de2224a6001f0f515e33eecf40a40027b932f6477e73b680ad91 |
| SHA1 hash: | e4ea26950d948f050b5b112c2e70bd8c8ffba8b7 |
| MD5 hash: | 8730ea97b4dc74557e9e90194f74cdd5 |
| humanhash: | grey-tango-autumn-vermont |
| File name: | Transfer Payment For Invoice 321-1005703.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 307'865 bytes |
| First seen: | 2021-08-02 05:26:40 UTC |
| Last seen: | 2021-08-02 11:36:46 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 589aee860f84814af33b4e1068b97d01 (5 x Formbook) |
| ssdeep | 6144:yq+RebD+czxRAWyemus56CpfshgamHdxMzB95fW50BAxE:qefNzxRbs5lpUWdOzB91mzE |
| Threatray | 7'244 similar samples on MalwareBazaar |
| TLSH | T1C3640240B8C1C8B4D4B2587645B4FA60E92DFE218B5199E7339C472B2FF51C0EA39D6E |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
3
# of downloads :
813
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Transfer Payment For Invoice 321-1005703.exe
Verdict:
Malicious activity
Analysis date:
2021-08-02 05:45:02 UTC
Tags:
trojan formbook stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Unauthorized injection to a recently created process
Sending a UDP request
Launching a process
Launching cmd.exe command interpreter
DNS request
Connection attempt
Sending an HTTP GET request
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Executable has a suspicious name (potential lure to open the executable)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.Cryptor
Status:
Malicious
First seen:
2021-08-01 23:57:15 UTC
AV detection:
21 of 46 (45.65%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 7'234 additional samples on MalwareBazaar
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader loader rat suricata
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Malware Config
C2 Extraction:
http://www.jiltedowl.com/um8e/
Unpacked files
SH256 hash:
40f7d71281aa5b1d292c4421619cb49f87f637579c8b2ec75db8f218a3d514fa
MD5 hash:
dcbdccf32594509ad091c0fe2703f145
SHA1 hash:
92cc96e5cf1dd12ff42c137ac38e26cbea8e91ad
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
0c6823e63b28799c28145805bc2c143c67a52698e4af497070b9da8439d6b327
MD5 hash:
8730ea97b4dc74557e9e90194f74cdd5
SHA1 hash:
e4ea26950d948f050b5b112c2e70bd8c8ffba8b7
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.