MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34066150ffa7efa505b8d2246925cd8a32f83b9609438ae76aa27cef7388054d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 34066150ffa7efa505b8d2246925cd8a32f83b9609438ae76aa27cef7388054d
SHA3-384 hash: 6ff9ec9d72a97b47742526276dc523e58c3cb11fd6d91a340dc91a98c4781ef3f51ead6da82b62a5684ee28d752fe55c
SHA1 hash: 27f1e8665c5423b43a5ad11a7d3762c539fbef9c
MD5 hash: 7b6e0668659b20f30bdf81025247a199
humanhash: bakerloo-equal-equal-uranus
File name:7b6e0668659b20f30bdf81025247a199.exe
Download: download sample
Signature Formbook
File size:223'999 bytes
First seen:2021-03-04 08:03:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger)
ssdeep 6144:l8LxBjJyJjpyAxdhfjBfYbfELMlk69bUr:0ujp1dhdSECkj
Threatray 4'019 similar samples on MalwareBazaar
TLSH ED24125B7280D873D19B927419BEA3BCF77952280052FC839B782E7F5A219874B5E2C1
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
156
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f0a960b15283f180e599491eb1e56be7.xlsx
Verdict:
Malicious activity
Analysis date:
2021-03-04 07:07:55 UTC
Tags:
encrypted exploit CVE-2017-11882 loader trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Unauthorized injection to a recently created process
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 363122 Sample: KU47Y1lTTU.exe Startdate: 04/03/2021 Architecture: WINDOWS Score: 100 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 4 other signatures 2->38 10 KU47Y1lTTU.exe 11 2->10         started        process3 file4 30 C:\Users\user\AppData\Local\...\0ps12v89.dll, PE32 10->30 dropped 42 Detected unpacking (changes PE section rights) 10->42 44 Maps a DLL or memory area into another process 10->44 46 Tries to detect virtualization through RDTSC time measurements 10->46 14 KU47Y1lTTU.exe 10->14         started        signatures5 process6 signatures7 48 Modifies the context of a thread in another process (thread injection) 14->48 50 Maps a DLL or memory area into another process 14->50 52 Sample uses process hollowing technique 14->52 54 Queues an APC in another process (thread injection) 14->54 17 explorer.exe 14->17 injected process8 process9 19 cmmon32.exe 17->19         started        22 autoconv.exe 17->22         started        24 autofmt.exe 17->24         started        signatures10 40 Tries to detect virtualization through RDTSC time measurements 19->40 26 cmd.exe 1 19->26         started        process11 process12 28 conhost.exe 26->28         started       
Threat name:
Win32.Trojan.Spynoon
Status:
Malicious
First seen:
2021-03-04 08:03:07 UTC
AV detection:
21 of 47 (44.68%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.856380692.xyz/nsag/
Unpacked files
SH256 hash:
72bfd52bce71b99feb63f8ae7267ccb38aa05845629213a0be0e189bad5e94be
MD5 hash:
a4d5bee54751541f0b302d0d20975e6b
SHA1 hash:
8ac677c0320f106b18b8ab6faa343715cff1aabc
SH256 hash:
f32d7fd5643ed0ab09b69efded38c6e4bce0641640bc6a1c3c1c7cd76bb412e4
MD5 hash:
136374c5041010bd613a8cc03acd2e98
SHA1 hash:
98b86d4aa6155841fb6eb10b5fcacc2558e76e23
SH256 hash:
34066150ffa7efa505b8d2246925cd8a32f83b9609438ae76aa27cef7388054d
MD5 hash:
7b6e0668659b20f30bdf81025247a199
SHA1 hash:
27f1e8665c5423b43a5ad11a7d3762c539fbef9c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 34066150ffa7efa505b8d2246925cd8a32f83b9609438ae76aa27cef7388054d

(this sample)

  
Delivery method
Distributed via web download

Comments