MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2b8099c7609f56157c7d2cb7e1da50b2ff85edb62e7599ca995a691b458ceb31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 2b8099c7609f56157c7d2cb7e1da50b2ff85edb62e7599ca995a691b458ceb31
SHA3-384 hash: 5c7d8e7a83496d8d8ef231c4bd24c625febdef1ec2ffb62b2fa65c6c3cec17f0ca425354f27cd2bbbd3c91c0ff5c66d3
SHA1 hash: 18130c5274260b0ffffa67da63b7f54307340ea7
MD5 hash: cb276158f3624e3fed9786fd3beb3184
humanhash: floor-fifteen-cold-ohio
File name:DHL_22040 документ о получении,pdf.exe
Download: download sample
Signature Formbook
File size:259'790 bytes
First seen:2022-02-22 09:12:03 UTC
Last seen:2022-02-22 11:00:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 6144:6xDtNuUdcU2RfWiQlx984k69UxXIlP/5G:qdX2/4k69UxYS
Threatray 13'488 similar samples on MalwareBazaar
TLSH T16C4402DAF6C094F7E8860AB008BBEE3610F77D2E3A35159F971D7B2A9B730821056547
File icon (PE):PE icon
dhash icon 050559c9190a4460 (13 x RemcosRAT, 5 x AgentTesla, 3 x Formbook)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
197
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DHL_22040 документ о получении,pdf.cab
Verdict:
No threats detected
Analysis date:
2022-02-22 19:03:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 576249 Sample: 0438,pdf.exe Startdate: 22/02/2022 Architecture: WINDOWS Score: 100 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 48 4 other signatures 2->48 11 0438,pdf.exe 18 2->11         started        process3 file4 32 C:\Users\user\AppData\...\xjzqzrrxfw.exe, PE32 11->32 dropped 14 xjzqzrrxfw.exe 1 11->14         started        process5 signatures6 58 Tries to detect virtualization through RDTSC time measurements 14->58 17 xjzqzrrxfw.exe 14->17         started        20 conhost.exe 14->20         started        process7 signatures8 34 Modifies the context of a thread in another process (thread injection) 17->34 36 Maps a DLL or memory area into another process 17->36 38 Sample uses process hollowing technique 17->38 40 Queues an APC in another process (thread injection) 17->40 22 explorer.exe 17->22 injected process9 signatures10 50 Uses netsh to modify the Windows network and firewall settings 22->50 25 netsh.exe 22->25         started        process11 signatures12 52 Modifies the context of a thread in another process (thread injection) 25->52 54 Maps a DLL or memory area into another process 25->54 56 Tries to detect virtualization through RDTSC time measurements 25->56 28 cmd.exe 1 25->28         started        process13 process14 30 conhost.exe 28->30         started       
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-02-22 09:12:12 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
Drops file in Windows directory
Unpacked files
SH256 hash:
e0943e2e23b9c81cda65514d57e036d187349a231f84f07b2fa7749cfc3e3e30
MD5 hash:
10c607195cd30b147f2591eac131ee19
SHA1 hash:
93626dec12f837926203e8436a83aafe7cb910cf
SH256 hash:
2b8099c7609f56157c7d2cb7e1da50b2ff85edb62e7599ca995a691b458ceb31
MD5 hash:
cb276158f3624e3fed9786fd3beb3184
SHA1 hash:
18130c5274260b0ffffa67da63b7f54307340ea7
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 2b8099c7609f56157c7d2cb7e1da50b2ff85edb62e7599ca995a691b458ceb31

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments