MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1d7800d50de8019f5f30a281730f4a77a39b14bff8bc385a302508eed2cfa5be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 8
| SHA256 hash: | 1d7800d50de8019f5f30a281730f4a77a39b14bff8bc385a302508eed2cfa5be |
|---|---|
| SHA3-384 hash: | 6e1cb94ed627b7e5de3435e1566f4eb9b57505c61ce8a83b6d14a868c04e4436cd77bf64f4c2c2b4186b943456804a8c |
| SHA1 hash: | d54ad90c4542f8de1eef0cfdb427decb3eada630 |
| MD5 hash: | 6803bb0ea46eca1dc973c636efd058fb |
| humanhash: | snake-august-quebec-william |
| File name: | 6803bb0ea46eca1dc973c636efd058fb |
| Download: | download sample |
| Signature | Formbook |
| File size: | 933'888 bytes |
| First seen: | 2021-11-05 16:20:45 UTC |
| Last seen: | 2021-11-05 22:04:31 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56b4814557e2e2739d9a5efb22e955d4 (3 x RemcosRAT, 1 x Formbook) |
| ssdeep | 12288:zvY8dhGipM4Yld9SyATMUCAyo5qTThHokUflI+5MWBnsQfnEPV:T9b3O4YldFATMUR5eIv5PBlfK |
| TLSH | T1E2156C529D4004F2F1631338796A9BB9ED35FE202A2C54461EBA3E4E4EF72813739D5B |
| File icon (PE): | |
| dhash icon | 697110152b2b1530 (9 x RemcosRAT, 6 x Formbook) |
| Reporter | |
| Tags: | 32 exe FormBook |
Intelligence
File Origin
# of uploads :
3
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
fareit keylogger remcos
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
DBatLoader FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2021-11-05 13:49:22 UTC
AV detection:
16 of 28 (57.14%)
Threat level:
5/5
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:s9m3 loader persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.445221.com/s9m3/
Unpacked files
SH256 hash:
b54acef9838cff6393d79dda537a22d53898471f564b788cb435f9eb9c14260a
MD5 hash:
30ce6fdc8056eb47d2d9d08479cd1468
SHA1 hash:
1eb253077018219fead30b06acf756605d92dfeb
Detections:
win_temple_loader_w0
Parent samples :
8406a7711b994e88a676af2eb5c9ec007dc91004e440e866d0c4bda8dd6e04ab
076b28855c1f83d5ee34627d5cd6991840e32767415837fd950617a0486b19cb
1cdcb4a583816fc3478e46c2db3d523332c4e88b0335501e31a6a0bf7084871f
6aece77e910abb363eae0ce97965198b89685a37414472be0320c88a9f5a44b3
2ca64cfb392dd47b94764fd043ef8aa654cda9a022668d94d99725d197fc3da6
0892f3b3de736822be2fa4913317b3926526e3289f9cf05a4015e5f9f01bef91
bb6ccf663f9bdaa2bcc49e79c1e94b06a1d575c3132767eb5b0116f93b881cbd
5b1f147d44d76bb57854bab35c1ed7c5b20d85868c9727c01f4c6ca826bbe6dd
a4c57d9643f299829a1239d5142a1aa19f89cc75de74501f656f03df0150c8ea
f4097221e19342e5b91103161eb7aaec277ff47ea694a86b92f7574be7959cc7
e6d92da520f7537c283b5a1424651263a2098a4b97e7f3b655cabed43b15015b
408d06eb0f8df445f72b771e26fac033f6a71f867d1bb5a1f78320e99b30d331
84e88e073e0fba18a2b05e25bb904a26cdb9f800ef7c6d39d85daacd88c56b76
1d7800d50de8019f5f30a281730f4a77a39b14bff8bc385a302508eed2cfa5be
85ba079f07da66a80dee82f93da2a0cd002d1cbd00bd285011288b04340a8d52
076b28855c1f83d5ee34627d5cd6991840e32767415837fd950617a0486b19cb
1cdcb4a583816fc3478e46c2db3d523332c4e88b0335501e31a6a0bf7084871f
6aece77e910abb363eae0ce97965198b89685a37414472be0320c88a9f5a44b3
2ca64cfb392dd47b94764fd043ef8aa654cda9a022668d94d99725d197fc3da6
0892f3b3de736822be2fa4913317b3926526e3289f9cf05a4015e5f9f01bef91
bb6ccf663f9bdaa2bcc49e79c1e94b06a1d575c3132767eb5b0116f93b881cbd
5b1f147d44d76bb57854bab35c1ed7c5b20d85868c9727c01f4c6ca826bbe6dd
a4c57d9643f299829a1239d5142a1aa19f89cc75de74501f656f03df0150c8ea
f4097221e19342e5b91103161eb7aaec277ff47ea694a86b92f7574be7959cc7
e6d92da520f7537c283b5a1424651263a2098a4b97e7f3b655cabed43b15015b
408d06eb0f8df445f72b771e26fac033f6a71f867d1bb5a1f78320e99b30d331
84e88e073e0fba18a2b05e25bb904a26cdb9f800ef7c6d39d85daacd88c56b76
1d7800d50de8019f5f30a281730f4a77a39b14bff8bc385a302508eed2cfa5be
85ba079f07da66a80dee82f93da2a0cd002d1cbd00bd285011288b04340a8d52
SH256 hash:
fbe655215047e80d159397743c259cc9f70d8f784c5ffd740f8f954cb837c8a7
MD5 hash:
9218160976bd8327e5ea2e92b613174a
SHA1 hash:
be9e90423c95800383bf6e9d06daaaa4ff89fa8c
SH256 hash:
19c79953429d962eae3cb164c471cdbca1a3aa605ddb7d5fab3e940abf6b713e
MD5 hash:
a518a5d0006f1f692af082c713c04fa3
SHA1 hash:
fe10797c50f4cc900b97e6327ecb56070250f74d
SH256 hash:
1d7800d50de8019f5f30a281730f4a77a39b14bff8bc385a302508eed2cfa5be
MD5 hash:
6803bb0ea46eca1dc973c636efd058fb
SHA1 hash:
d54ad90c4542f8de1eef0cfdb427decb3eada630
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://192.3.121.164/22022/vbc.exe