MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2367254fbd874513695dfff5049f648d0ffe6a29d085f1f9e14cf5c8879aa106. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2367254fbd874513695dfff5049f648d0ffe6a29d085f1f9e14cf5c8879aa106
SHA3-384 hash: 60fc3c83f2bf27150e65d9d9606df55abfe72f04df204e2d5b44a1987550a55655301a663ef132cfcbf9071b27c1ca25
SHA1 hash: f643756a91e28abca7316f40187a24c796ae4e9c
MD5 hash: 0844af8d4b722f26524db2475157e4e3
humanhash: fanta-four-violet-colorado
File name:SA-NQAW12n-NC9W03-pdf.gz
Download: download sample
Signature Formbook
File size:654'430 bytes
First seen:2021-04-19 15:26:21 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:3fDNQ9VIPa5PYAN+NeNUZc1YA8rwfVG4lCPXjp71Y7if:3fy921AX0NAVGhPXjkif
TLSH 80D423E8D2B226272D370EB087DCD2C5ADDD013B62C535D4CE5A7432D8BA60EE69F419
Reporter GovCERT_CH

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.cheristolentino.com/uwec/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 2367254fbd874513695dfff5049f648d0ffe6a29d085f1f9e14cf5c8879aa106

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments