MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ba337aa0663470b85d2b1b97713a219ea8c5d7ee7f5795dfc9017ae2b123e47. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 4ba337aa0663470b85d2b1b97713a219ea8c5d7ee7f5795dfc9017ae2b123e47
SHA3-384 hash: ff54c2f86b9cda7dbd120489e4dfe797af966a540cd5540b6244e3b403e0fa407e4a46f2aae11ba6756c5131d0e99111
SHA1 hash: cbdc0fa6fdbe213ae0fdd7876cb240c5ed127085
MD5 hash: 4120b10b0d7bce420e1f0f7e6ae1739f
humanhash: helium-magnesium-kitten-muppet
File name:b1r18YD8w9HwQBi.exe
Download: download sample
Signature Formbook
File size:832'512 bytes
First seen:2022-01-26 13:26:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'656 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 24576:yOJiJLNUVd6O8Mtw/QhJrD1yGuK6A9PfsgX:qJJUVd7SonP1y3K64PJX
TLSH T11905AE6BF449C83AD29A497641CFB00E43B4B843FECBF19A3E97F5497151B86AA0510F
Reporter malwarelabnet
Tags:exe FormBook xloader

Intelligence


File Origin
# of uploads :
1
# of downloads :
169
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe obfuscated packed replace.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-01-26 07:26:27 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:wdc8 loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Xloader Payload
Xloader
Unpacked files
SH256 hash:
07979e0810fdc7cf3fcad512b4f405a9cecb94a03d84cbab06ba404281c686cb
MD5 hash:
18036dc4ce36569ab6f56b88c8e372ec
SHA1 hash:
93b33b6a21b97e9c82874f23693e89f56d5ba2c5
SH256 hash:
5247926388ed51a1178cb1de85bc5df1443c240ace43d7d9386edf8d7fceec02
MD5 hash:
9a6cb543f17cc6f61c016dbc8a331bc2
SHA1 hash:
62210e9d0f4d5b8101886a336feb3e1ae0eaf824
SH256 hash:
4ba337aa0663470b85d2b1b97713a219ea8c5d7ee7f5795dfc9017ae2b123e47
MD5 hash:
4120b10b0d7bce420e1f0f7e6ae1739f
SHA1 hash:
cbdc0fa6fdbe213ae0fdd7876cb240c5ed127085
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments