MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42fdf8ea94129772b3a3a9cb027ae40613d5aba9de2b6f32f801d00f1c5ccf44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 42fdf8ea94129772b3a3a9cb027ae40613d5aba9de2b6f32f801d00f1c5ccf44
SHA3-384 hash: 6603cde25ea2a51acbed030634c0a42abd8d4ba25e55767e48f572eb666642a01b07d13e2a3bb22e6e9ff9ec4e29a89a
SHA1 hash: 2ba11deb25247efc4a7232cc40b80750b35df39b
MD5 hash: f93ee232ebfb7cf5293927a295a3149a
humanhash: solar-uranus-juliet-victor
File name:filelegend.exe
Download: download sample
Signature Formbook
File size:471'552 bytes
First seen:2020-10-25 13:30:18 UTC
Last seen:2020-10-25 15:41:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 6144:YglzdTZ4rjNxG/i/OfFGr6O2lNu6HCIYNLKjCAKSjB:5V/4rjvGiO9C6OuNuzHVKO2jB
Threatray 353 similar samples on MalwareBazaar
TLSH 92A4CFB23C92597ECA6F077505A985C0FABA16C73FA48B0D71AF430C0E11E5BAB57247
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Sending a UDP request
Creating a window
Creating a file
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-25 13:30:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Loads dropped DLL
Unpacked files
SH256 hash:
42fdf8ea94129772b3a3a9cb027ae40613d5aba9de2b6f32f801d00f1c5ccf44
MD5 hash:
f93ee232ebfb7cf5293927a295a3149a
SHA1 hash:
2ba11deb25247efc4a7232cc40b80750b35df39b
SH256 hash:
f8bee4108a324df32ad5a2ebafa6b7f411402a21e2598cf9db66486970f80fdd
MD5 hash:
a92da98ff6f5ae608503d074617bcc2a
SHA1 hash:
d3eafcccca011bb3a7a5ae52dd9704ceafcde472
SH256 hash:
9705f6856a88e616cfd1885bdf2d4938db2abe04d78377bc892f8537a0b98559
MD5 hash:
b05e7b532443fc8b72d8315594f5135a
SHA1 hash:
e01dbdf3547d0348fb6cca031cd1df8a41964485
SH256 hash:
d80f9eb9dd6d3388802966ab437bb7329a84f462db3c550c2f8fe8d59ca14c4d
MD5 hash:
08a174ddb1d56c135a0b8146265808c8
SHA1 hash:
224c78e989f6cac6bcc2e9901ab5f4325d5f9be9
Detections:
win_formbook_g0 win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments