MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d87d74fe3b493880a672905108416227b6a2996eae2da3d8226cf65ae8ade26. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 1d87d74fe3b493880a672905108416227b6a2996eae2da3d8226cf65ae8ade26
SHA3-384 hash: 574c63cc94be92defdd3d9db13487329533bfd47cc3d023d89387a74c4bb1cb2e96f0fab872287392c725c1b8c6657a3
SHA1 hash: 082edf778cbf0a7af0994d2a0b7d397b6a820f33
MD5 hash: 2d435a73a52785b8912a447e4e205e50
humanhash: foxtrot-triple-failed-spring
File name:SecuriteInfo.com.Trojan.PWS.Stealer.29819.13214.25469
Download: download sample
Signature Formbook
File size:304'128 bytes
First seen:2021-01-21 10:15:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 52b6f9925181b207b99c579c99e10d60 (4 x Loki, 2 x Formbook, 2 x RemcosRAT)
ssdeep 6144:i0UOVjp2qn9FrB/gBzCgGb/2fEMaejKHwqXRcEmqzoyybe9AYQotupuW8dV:i0tjXn9FAugGuEMaejOlRcEXoy+oK8dV
Threatray 3'611 similar samples on MalwareBazaar
TLSH FD54E02979C0D032C4961170897997F2DE79B8322A3924C7F39C89399F74BC1A27E65F
Reporter SecuriteInfoCom
Tags:FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO81105083.xlsx
Verdict:
Malicious activity
Analysis date:
2021-01-21 06:30:10 UTC
Tags:
encrypted exploit CVE-2017-11882 trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-01-21 07:12:08 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:xloader loader rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Xloader Payload
Formbook
Xloader
Malware Config
C2 Extraction:
http://www.chuanxingtong.com/j5an/
Unpacked files
SH256 hash:
1d87d74fe3b493880a672905108416227b6a2996eae2da3d8226cf65ae8ade26
MD5 hash:
2d435a73a52785b8912a447e4e205e50
SHA1 hash:
082edf778cbf0a7af0994d2a0b7d397b6a820f33
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 1d87d74fe3b493880a672905108416227b6a2996eae2da3d8226cf65ae8ade26

(this sample)

  
Delivery method
Distributed via web download

Comments