MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 21bef61d089e5e691910c29a0095780e92c23359114b4dd64a207430785c7dc9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 21bef61d089e5e691910c29a0095780e92c23359114b4dd64a207430785c7dc9 |
|---|---|
| SHA3-384 hash: | d5a4c0cb40e552b0bf628fc41545e6569a8d09dccebc5e6834cffefb26195173b639cbd43948708d405334c4816dac59 |
| SHA1 hash: | 86749037bcffcc8faf940ccdd079743ffcbc5be9 |
| MD5 hash: | 56e5cbcb1f6e53497aabd47d5c19d754 |
| humanhash: | stream-potato-xray-sad |
| File name: | Posta siparisi hk.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 259'283 bytes |
| First seen: | 2022-12-22 09:57:57 UTC |
| Last seen: | 2022-12-22 13:19:36 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 97318da386948415d08cef4a9006d669 (71 x Formbook, 35 x SnakeKeylogger, 26 x AgentTesla) |
| ssdeep | 6144:rkwsXfFhyaBATvRaBcsqgKzYXmfpnPxG43sUsNwORv:mXthZB2qcDgoYWfpnPcusUiF |
| TLSH | T1DA4412CAF6C388EBC5D615B35DDF9B3E9BF683340815535B57808E7E0522BC2D8026A5 |
| TrID | 92.7% (.EXE) NSIS - Nullsoft Scriptable Install System (846567/2/133) 3.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 1.1% (.EXE) Win64 Executable (generic) (10523/12/4) 0.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 0.5% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
191
Origin country :
DEVendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Posta siparisi hk.exe
Verdict:
Malicious activity
Analysis date:
2022-12-22 09:58:58 UTC
Tags:
installer formbook xloader trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
Launching a process
Сreating synchronization primitives
Launching cmd.exe command interpreter
Searching for synchronization primitives
Sending a custom TCP request
Reading critical registry keys
Setting browser functions hooks
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
No Threat
Threat level:
2/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-12-22 09:58:07 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
21 of 26 (80.77%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:tc10 rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
6e49b2b262ac38f198d3041c9026e33d18c73016e94bde4ff1842f9d3b96939d
MD5 hash:
8b5455ff988635a46fea6849913985a2
SHA1 hash:
efdf67571da97a852a88e41112a1640074877732
Detections:
FormBook
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
899756abbbc534ed6a40d487853276bcbc40456c953acf37ceb45b5fe3521e29
MD5 hash:
fc55b45d53abe2a49017b58a79604119
SHA1 hash:
b57a174b9906ff5a89adf01f9ef868ce1472a70e
SH256 hash:
21bef61d089e5e691910c29a0095780e92c23359114b4dd64a207430785c7dc9
MD5 hash:
56e5cbcb1f6e53497aabd47d5c19d754
SHA1 hash:
86749037bcffcc8faf940ccdd079743ffcbc5be9
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.18
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.