MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36fa0c2bd4ebc419638530f5ed45d4efe1a25a0703167f88bb3b9dbe6404109e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: 36fa0c2bd4ebc419638530f5ed45d4efe1a25a0703167f88bb3b9dbe6404109e
SHA3-384 hash: 0a8204d9deec853e97862877f4383cbbd1700fdde3e12382775a28801a69a8ad94b79c02638607b64b6fe13aa802d113
SHA1 hash: 16987f10f7d6ce7d40943373c709954460737585
MD5 hash: 55a08e1f07bd8f2902885bed6cc400e8
humanhash: arkansas-pizza-yankee-fourteen
File name:55a08e1f07bd8f2902885bed6cc400e8.exe
Download: download sample
Signature Formbook
File size:1'016'832 bytes
First seen:2021-07-30 06:12:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:45bN+4YDs/dq1ZXhMtnD1K3djsLqKrqdjGs5+m4bqKeZ3kTzqrKH45wmuF7vH2:O+4/dqPonqAqKrBsum3kTzqWHOyxvH
Threatray 7'260 similar samples on MalwareBazaar
TLSH T1F325BE11B9C8DF46D46D07328FDE46244BF8B882A4B2DE2D3EA432FD5450762E93935E
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
566
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aop 110332.xlsx
Verdict:
Malicious activity
Analysis date:
2021-07-30 05:39:26 UTC
Tags:
encrypted exploit CVE-2017-11882 loader trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 456749 Sample: ieeWdm3u18.exe Startdate: 30/07/2021 Architecture: WINDOWS Score: 100 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 3 other signatures 2->42 10 ieeWdm3u18.exe 3 2->10         started        process3 file4 32 C:\Users\user\AppData\...\ieeWdm3u18.exe.log, ASCII 10->32 dropped 52 Tries to detect virtualization through RDTSC time measurements 10->52 54 Injects a PE file into a foreign processes 10->54 14 ieeWdm3u18.exe 10->14         started        17 ieeWdm3u18.exe 10->17         started        19 ieeWdm3u18.exe 10->19         started        signatures5 process6 signatures7 56 Modifies the context of a thread in another process (thread injection) 14->56 58 Maps a DLL or memory area into another process 14->58 60 Sample uses process hollowing technique 14->60 62 Queues an APC in another process (thread injection) 14->62 21 explorer.exe 14->21 injected process8 dnsIp9 34 www.redudiban.com 21->34 44 System process connects to network (likely due to code injection or exploit) 21->44 25 raserver.exe 21->25         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 25->46 48 Maps a DLL or memory area into another process 25->48 50 Tries to detect virtualization through RDTSC time measurements 25->50 28 cmd.exe 1 25->28         started        process13 process14 30 conhost.exe 28->30         started       
Threat name:
ByteCode-MSIL.Trojan.Taskun
Status:
Malicious
First seen:
2021-07-30 06:13:06 UTC
AV detection:
17 of 46 (36.96%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
CustAttr .NET packer
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.adultpeace.com/p2io/
Unpacked files
SH256 hash:
4616a9f45edafce801bf4cc60bf28ab6001cf94b81d9607a2e0a34e3f648f8db
MD5 hash:
4b672b6d5cbfc6486d0ac8f8af4481b9
SHA1 hash:
38b775d53204c7e63d67b83add3b95f193e796b3
Detections:
win_formbook_g0 win_formbook_auto
Parent samples :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 hash:
f804f8f10ac5702bffceae1ae8e7a7948a15b1047ff0db9cc3498b5e2f78b47a
MD5 hash:
aa74478d3f806d830b103ab3e42a69e6
SHA1 hash:
f70c381d3601f9698b76a15dae3a1d12e8be4034
SH256 hash:
97d2fa1d01b2f9a2199896e05e0cf60c14a9f41ef2d72e15fbb862b7afa08438
MD5 hash:
68463851c0e6fe7a254c99fae763d454
SHA1 hash:
4587a5371d88c296a0184fe47ee0c5245b187127
SH256 hash:
36fa0c2bd4ebc419638530f5ed45d4efe1a25a0703167f88bb3b9dbe6404109e
MD5 hash:
55a08e1f07bd8f2902885bed6cc400e8
SHA1 hash:
16987f10f7d6ce7d40943373c709954460737585
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 36fa0c2bd4ebc419638530f5ed45d4efe1a25a0703167f88bb3b9dbe6404109e

(this sample)

  
Delivery method
Distributed via web download

Comments