MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f9d8536fa4475655dd14db7d472399f2b7214ddb16d3483f9a2a673e4fc1543. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 4f9d8536fa4475655dd14db7d472399f2b7214ddb16d3483f9a2a673e4fc1543
SHA3-384 hash: efe0b4a0e26432f7dc1da757d07cc40f4142ed6d94dc5be42f9c2093462da9228bf01e5572be10116ca1b931f6f9beae
SHA1 hash: 695b8743c0a62a837d31d2e6e6dd1e574a76de03
MD5 hash: 3fbfc82d120ab09cc7ffa16cb70ac4e6
humanhash: south-lamp-xray-saturn
File name:SecuriteInfo.com.Trojan.Packed2.43157.10012.17335
Download: download sample
Signature Formbook
File size:235'568 bytes
First seen:2021-06-01 01:45:37 UTC
Last seen:2021-06-01 02:42:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 6144:8Qq+heTn4+ufeHyGM3enCcfzVpvRJjl7NSY7Tx0qp:TheTnRdHyGM3X67ZbNSY7Kqp
Threatray 5'507 similar samples on MalwareBazaar
TLSH C334122A22C561FFDC1A71B284B7F93AD377971104282337AFB85FAE8D245C2C593985
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
NEW ORDER.gz
Verdict:
Malicious activity
Analysis date:
2021-06-01 01:19:57 UTC
Tags:
installer trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-06-01 00:41:41 UTC
AV detection:
16 of 45 (35.56%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.gicc-fx.com/uer0/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments