MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3f00dc9a046489c35c6dbcfcf2d91dfe03f7f700574be6a87fa623381727f92a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | 3f00dc9a046489c35c6dbcfcf2d91dfe03f7f700574be6a87fa623381727f92a |
|---|---|
| SHA3-384 hash: | ba169ef1c279f2ca3b03975686c06b5ceea6a2aec8cd5247b84aeb8a367eadcc578ebf6a542bfddbd9e507b2455d0153 |
| SHA1 hash: | c975900a226269d980d8d5bcd989ad44ba0dc667 |
| MD5 hash: | c568864dc1f921c09ecef26318d2ec76 |
| humanhash: | georgia-river-fruit-carolina |
| File name: | FedEx Docs.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 235'310 bytes |
| First seen: | 2022-11-21 11:21:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 29b61e5a552b3a9bc00953de1c93be41 (174 x Formbook, 82 x AgentTesla, 81 x Loki) |
| ssdeep | 6144:MEa0N3GbdvIo4BrW1/eUFnhe8FtvqR9lWdz:X3QvIo4U86e83yrWx |
| Threatray | 20'506 similar samples on MalwareBazaar |
| TLSH | T1FC341253F2C5E563E37A91328CB3AF75D6FBC6215015A9DB4FD52A3B0862243E53A403 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
220
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
FedEx Docs.exe
Verdict:
Malicious activity
Analysis date:
2022-11-21 11:21:49 UTC
Tags:
formbook trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Launching a process
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process
Searching for synchronization primitives
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2022-11-16 13:27:00 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 26 (88.46%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 20'496 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:fqsu rat spyware stealer trojan
Behaviour
Gathers network information
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
bbc5a60f9140e40979a13d24e8fae142bff9140af94fe95cc1455160781aafbb
MD5 hash:
f13d54398929634fd143ef5ea8c6a3e3
SHA1 hash:
2c9224e7a169098f9c05f869746e84fb7f6fd928
Detections:
XLoader
win_formbook_auto
win_formbook_g0
Parent samples :
06c7385ce806a0c86049b99d727503a8e04f06989d9f4f5002cde47efc0b55b7
fc5e3a0a5ffb1c7fff8495b83f05f7e4930862fbd142d3f6a530900a8d468361
beefe852464031dbae67ac50b2c9dd134459825813060f22253071438a5c8d6f
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57
ddb8cbee16af7e596113afb0a5bae71a649ed230b1190263665311e26074c398
d701a8ff6cbf6b7185542952981ff88609347b2641df1b18827bd63eb60ef8c1
0e510843e249f98ef12352a4b13afc388c18e82d55c29e18f59241e29ac10d67
f14851a00305d5e72bddd2e629b1156a7b0bb5117e1531cae00789eb4d71fcd8
ab3b2d262d28cb3b2fb07bb5c3692f09eafefe29057c4c35a3e62088f2d09bd1
c8d21ab721d86238a304f5cd72da73acad72cc635597e8b3949743f4682a20f3
46d6f72ac6a32b48dca1524cae6d13c568d71fc0bc7377817911504d482e9a9b
6140005553a006e1fc0f489312d1ba70c84851f9e9a503daaf9665c72c1684bc
b4e919a8dd061ad70552ed8e27679edda38c754a1bf6b9672ced36b1e2f3e028
e7af05d6e7ec4ea68d42fdcd19bbfabb3c3e7dd2609582d87d5a9f5b387ac792
d6ed44f8974685e43802fae6ce9a8aed3e2bdcf8c8bb71b9d5922025f07647e6
f20ad7e274313f3591f72f31f17d40df124361cdaf747337b32e0ee6da20fd7c
3f00dc9a046489c35c6dbcfcf2d91dfe03f7f700574be6a87fa623381727f92a
3a9fc480e92a401646b0b9e69bc8e19946227978764aa497654b4fa78aeb9114
91eb471360ca2026ba5ab198bcee13a722cc72afa083c5e9ee63cace5eccb6a7
d539659a09b05e566ef841b6fcd758915b5a2162fd666d35d37ee06687becc8a
344ae4ecfec1e2a0ca7c2e6b970f077cf55fd1c7cbe41d8963b83848ccf0b229
f17fc7f53eeddd0978d35a6d040c90a8f7cffb6c540b42e401062f689cd2589b
fc5e3a0a5ffb1c7fff8495b83f05f7e4930862fbd142d3f6a530900a8d468361
beefe852464031dbae67ac50b2c9dd134459825813060f22253071438a5c8d6f
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57
ddb8cbee16af7e596113afb0a5bae71a649ed230b1190263665311e26074c398
d701a8ff6cbf6b7185542952981ff88609347b2641df1b18827bd63eb60ef8c1
0e510843e249f98ef12352a4b13afc388c18e82d55c29e18f59241e29ac10d67
f14851a00305d5e72bddd2e629b1156a7b0bb5117e1531cae00789eb4d71fcd8
ab3b2d262d28cb3b2fb07bb5c3692f09eafefe29057c4c35a3e62088f2d09bd1
c8d21ab721d86238a304f5cd72da73acad72cc635597e8b3949743f4682a20f3
46d6f72ac6a32b48dca1524cae6d13c568d71fc0bc7377817911504d482e9a9b
6140005553a006e1fc0f489312d1ba70c84851f9e9a503daaf9665c72c1684bc
b4e919a8dd061ad70552ed8e27679edda38c754a1bf6b9672ced36b1e2f3e028
e7af05d6e7ec4ea68d42fdcd19bbfabb3c3e7dd2609582d87d5a9f5b387ac792
d6ed44f8974685e43802fae6ce9a8aed3e2bdcf8c8bb71b9d5922025f07647e6
f20ad7e274313f3591f72f31f17d40df124361cdaf747337b32e0ee6da20fd7c
3f00dc9a046489c35c6dbcfcf2d91dfe03f7f700574be6a87fa623381727f92a
3a9fc480e92a401646b0b9e69bc8e19946227978764aa497654b4fa78aeb9114
91eb471360ca2026ba5ab198bcee13a722cc72afa083c5e9ee63cace5eccb6a7
d539659a09b05e566ef841b6fcd758915b5a2162fd666d35d37ee06687becc8a
344ae4ecfec1e2a0ca7c2e6b970f077cf55fd1c7cbe41d8963b83848ccf0b229
f17fc7f53eeddd0978d35a6d040c90a8f7cffb6c540b42e401062f689cd2589b
SH256 hash:
fc1e9c9d0524f405aab192c521a553a1483ae0de315d3277a69402fdade05491
MD5 hash:
b2a5b0e0e70eb909712785ad6fd3d296
SHA1 hash:
cd4a580c6152738ecf553db9ec4fdc8673156f80
SH256 hash:
c3e9689814943d710c668e02292a4ca8fb0c6eac62897745870e848a734cd667
MD5 hash:
a9e2a3c0c8b4dde4745b2bd80a894ddc
SHA1 hash:
201f9f57dbb5b49e5ad3a1a959dbdb5e06a0126d
SH256 hash:
3f00dc9a046489c35c6dbcfcf2d91dfe03f7f700574be6a87fa623381727f92a
MD5 hash:
c568864dc1f921c09ecef26318d2ec76
SHA1 hash:
c975900a226269d980d8d5bcd989ad44ba0dc667
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.38
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.