MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 28ca1fe12d85075d947b1bc3292c14cba784ed1e22287e56819d9a1d86b2f7e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 28ca1fe12d85075d947b1bc3292c14cba784ed1e22287e56819d9a1d86b2f7e4
SHA3-384 hash: e9ebd9ab2b840a18ae6eb4c918078eb3f4f2eef77e1f1d293b23207093b352afdd80681d736f2d63f4bf7207ac7ebb40
SHA1 hash: 1c46c2f11abbbfa1366b4b11399db8ba314c5e64
MD5 hash: 659cbf70042b70294be8c952b8cf744c
humanhash: video-victor-west-romeo
File name:decode_f5a3ef195a34fd8d4549a25d275c5084e8cfe9e2a09e257145e14b8a6e33f9c3
Download: download sample
Signature Formbook
File size:189'952 bytes
First seen:2023-01-23 15:41:44 UTC
Last seen:2023-01-24 10:29:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 3072:antA0o3EbcekeolLrMH4QeXsxYz6eSJo3mpu4S8uhHMImlDBOT:aivEgjVrbQ7xYz6/Jo393HM9u
Threatray 20'067 similar samples on MalwareBazaar
TLSH T16404139ED49870D6FEB6A77A1B4B6A9452023BF0800ED5A3A37CD1C6B049BE5770530F
Reporter jstrosch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
219
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
decode_f5a3ef195a34fd8d4549a25d275c5084e8cfe9e2a09e257145e14b8a6e33f9c3
Verdict:
No threats detected
Analysis date:
2023-01-23 15:51:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Verdict:
No Threat
Threat level:
  2/10
Confidence:
67%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Antivirus / Scanner detection for submitted sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2023-01-23 15:44:51 UTC
File Type:
PE (Exe)
AV detection:
21 of 39 (53.85%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Unpacked files
SH256 hash:
89ad70b085f6be4c38e9866bdd9a00c0816c96e90a299113ddfc0974c507f013
MD5 hash:
65c2e23b48d0211815483216a18ed2f4
SHA1 hash:
6f9eca2f61fe45f55e508f67648cf88017d1de18
Detections:
win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
28ca1fe12d85075d947b1bc3292c14cba784ed1e22287e56819d9a1d86b2f7e4
MD5 hash:
659cbf70042b70294be8c952b8cf744c
SHA1 hash:
1c46c2f11abbbfa1366b4b11399db8ba314c5e64
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments