MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 200c25e3ad1dd6d924455a89035c1c677c7b319a89e3e9fac0499514175b67fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments 1

SHA256 hash: 200c25e3ad1dd6d924455a89035c1c677c7b319a89e3e9fac0499514175b67fc
SHA3-384 hash: b050437209ce60c15fd987d5278d03985fcb06b92ae3b1938609402454c4bba37a886ee842128bd54aff0faefab997f8
SHA1 hash: 056ba8bbc6045576bfe8bc2526bf70942a3e4286
MD5 hash: e6fb6a28bf4e2a128876d9f4bddcb0e5
humanhash: golf-music-stream-three
File name:e6fb6a28bf4e2a128876d9f4bddcb0e5
Download: download sample
Signature Formbook
File size:380'468 bytes
First seen:2022-01-11 01:26:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 6144:yybLO77lM6ywAQQRHq7BRT3vOB78+ce+a2YuXogj6CHtIIO0sOwgiWvVEo:PbLe7lM6ywARK7BRTf27JyIu4oPawvio
TLSH T1318423E668C8446FDB6B47B2023BEA3FC332C5954592A0FB8F812DBE1767042C52D943
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
192
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
http://lawetalu.webd.pro/m.exe
Verdict:
Malicious activity
Analysis date:
2022-01-11 00:28:29 UTC
Tags:
trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe expand.exe jsc.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Self deletion via cmd delete
Sigma detected: CMSTP Execution Process Creation
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 550497 Sample: ZCzz2f9VAo Startdate: 11/01/2022 Architecture: WINDOWS Score: 100 34 www.griffin2008.top 2->34 38 Multi AV Scanner detection for domain / URL 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 6 other signatures 2->44 11 ZCzz2f9VAo.exe 18 2->11         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\...\utjmpu.dll, PE32 11->32 dropped 54 Tries to detect virtualization through RDTSC time measurements 11->54 56 Injects a PE file into a foreign processes 11->56 15 ZCzz2f9VAo.exe 11->15         started        signatures6 process7 signatures8 58 Modifies the context of a thread in another process (thread injection) 15->58 60 Maps a DLL or memory area into another process 15->60 62 Sample uses process hollowing technique 15->62 64 Queues an APC in another process (thread injection) 15->64 18 explorer.exe 15->18 injected process9 process10 20 cmstp.exe 18->20         started        signatures11 46 Self deletion via cmd delete 20->46 48 Modifies the context of a thread in another process (thread injection) 20->48 50 Maps a DLL or memory area into another process 20->50 52 Tries to detect virtualization through RDTSC time measurements 20->52 23 explorer.exe 141 20->23         started        26 cmd.exe 1 20->26         started        28 explorer.exe 2 156 20->28         started        process12 dnsIp13 36 192.168.2.1 unknown unknown 23->36 30 conhost.exe 26->30         started        process14
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-01-11 01:27:11 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
22 of 27 (81.48%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:h4d0 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Formbook Payload
Formbook
Unpacked files
SH256 hash:
200c25e3ad1dd6d924455a89035c1c677c7b319a89e3e9fac0499514175b67fc
MD5 hash:
e6fb6a28bf4e2a128876d9f4bddcb0e5
SHA1 hash:
056ba8bbc6045576bfe8bc2526bf70942a3e4286
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 200c25e3ad1dd6d924455a89035c1c677c7b319a89e3e9fac0499514175b67fc

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-11 01:26:31 UTC

url : hxxp://lawetalu.webd.pro/m.exe