MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | 1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece |
|---|---|
| SHA3-384 hash: | 4c19faaa2a38ef2f0a0305a7441b5b8ede45d4096a2dd5e115db14180573f9ee32509b868a84ea5ff31ad449d4eefa2f |
| SHA1 hash: | 25c25c70ba0e88f4952fb739df0e9d48896b71fd |
| MD5 hash: | 20f7d95a5ff1ad22ebabc1037556c014 |
| humanhash: | bluebird-xray-angel-mars |
| File name: | Adjunto orden de compra.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'156'096 bytes |
| First seen: | 2022-03-20 09:57:09 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 066f2adf6884c84166ea572f3442e2f3 (8 x Formbook, 2 x RemcosRAT) |
| ssdeep | 12288:RbojJKNbgMwT2NRAvS/yqenMbJjRsBp8oziAO8Iz2sVW3MUqI6F3HAhcAszeVQ18:elKiCRAvS6qOMZGBNgzyqTHAhU2 |
| Threatray | 14'519 similar samples on MalwareBazaar |
| TLSH | T185355BF2E2908832D4223A384C5F5EB9B52A7E01DDE86546E6E43F093F3D571EC12A57 |
| File icon (PE): | |
| dhash icon | 342c6c9c97cc6492 (11 x Formbook, 9 x RemcosRAT, 1 x AveMariaRAT) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
301
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Searching for synchronization primitives
Launching cmd.exe command interpreter
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm control.exe keylogger replace.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
DBatLoader FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-03-17 10:12:21 UTC
File Type:
PE (Exe)
Extracted files:
43
AV detection:
28 of 42 (66.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 14'509 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:3nop persistence rat spyware stealer trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Formbook Payload
Formbook
Unpacked files
SH256 hash:
910643e097087347bc2ba8a94762e0a7ab1f0abe57d2ed9fce948e396196f9eb
MD5 hash:
9a7f54f375f5d0a3b346f23744469228
SHA1 hash:
36f360ed7b51f4a4db4fc23781185581a5464323
Detections:
win_dbatloader_w0
Parent samples :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 hash:
1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece
MD5 hash:
20f7d95a5ff1ad22ebabc1037556c014
SHA1 hash:
25c25c70ba0e88f4952fb739df0e9d48896b71fd
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.