MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51abc2e98d5bd75b74bf30aab05092d714cf2ae43c55e9640c883293ca2d5db9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 51abc2e98d5bd75b74bf30aab05092d714cf2ae43c55e9640c883293ca2d5db9
SHA3-384 hash: 791032f65179b497da4df99bb70d6ab4bdde8bd75ac57e1156ac16be29fe8383e4b3e0a97f334e8c0ac9f27a0e8fade7
SHA1 hash: bb0a6a3f211d8f05c108315d393710b357d54879
MD5 hash: 3337f2f040878565081d719c1fe3143e
humanhash: minnesota-white-washington-chicken
File name:Statement of account, 2021 to 2021.PDF.exe
Download: download sample
Signature Formbook
File size:730'112 bytes
First seen:2022-02-14 11:47:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 50e822ed4b7a82a71d116b8c7e2396d5 (4 x Formbook, 1 x AveMariaRAT, 1 x NetWire)
ssdeep 12288:FlZjc75hO32cpuG7NVM1/vcDy50eVmZyqGz2PASl0i1K2K8Jr:3iz2puG7NVM1/kcVNqGzqFX1K8Z
Threatray 11'768 similar samples on MalwareBazaar
TLSH T15AF48F21B1E08AF7C12F6A789C1A77B96819BE402E185C4B3EE76F485F3D281743615F
File icon (PE):PE icon
dhash icon 4cca4c67d3261aca (6 x RemcosRAT, 4 x Formbook, 2 x AveMariaRAT)
Reporter GovCERT_CH
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
153
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
estratto.zip
Verdict:
Malicious activity
Analysis date:
2022-02-14 11:22:08 UTC
Tags:
trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Searching for synchronization primitives
Launching cmd.exe command interpreter
Sending an HTTP GET request
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 571779 Sample: Statement of account, 2021 ... Startdate: 14/02/2022 Architecture: WINDOWS Score: 100 46 www.mshoppingworld.online 2->46 48 www.mdaszb.com 2->48 50 mdaszb.com 2->50 92 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->92 94 Found malware configuration 2->94 96 Malicious sample detected (through community Yara rule) 2->96 98 8 other signatures 2->98 11 Statement of account, 2021 to 2021.PDF.exe 1 17 2->11         started        signatures3 process4 dnsIp5 72 onedrive.live.com 11->72 74 am-files.fe.1drv.com 11->74 76 5azi3a.am.files.1drv.com 11->76 42 C:\Users\user\Mugohkzd.exe, PE32 11->42 dropped 44 C:\Users\user\Mugohkzd.exe:Zone.Identifier, ASCII 11->44 dropped 124 Writes to foreign memory regions 11->124 126 Allocates memory in foreign processes 11->126 128 Creates a thread in another existing process (thread injection) 11->128 130 Injects a PE file into a foreign processes 11->130 16 logagent.exe 11->16         started        file6 signatures7 process8 signatures9 78 Modifies the context of a thread in another process (thread injection) 16->78 80 Maps a DLL or memory area into another process 16->80 82 Sample uses process hollowing technique 16->82 84 2 other signatures 16->84 19 explorer.exe 2 16->19 injected 23 systray.exe 16->23         started        process10 dnsIp11 52 finetipster.com 197.248.5.16, 49827, 80 SafaricomKE Kenya 19->52 54 parkingpage.namecheap.com 198.54.117.218, 49832, 80 NAMECHEAP-NETUS United States 19->54 56 12 other IPs or domains 19->56 100 System process connects to network (likely due to code injection or exploit) 19->100 102 Performs DNS queries to domains with low reputation 19->102 25 Mugohkzd.exe 15 19->25         started        29 wlanext.exe 12 19->29         started        31 Mugohkzd.exe 15 19->31         started        104 Tries to detect virtualization through RDTSC time measurements 23->104 signatures12 process13 dnsIp14 58 onedrive.live.com 25->58 66 2 other IPs or domains 25->66 106 Multi AV Scanner detection for dropped file 25->106 108 Writes to foreign memory regions 25->108 110 Allocates memory in foreign processes 25->110 33 logagent.exe 25->33         started        60 yjz2.800cdn.com 29->60 62 www.stuinfo.xyz 29->62 68 2 other IPs or domains 29->68 112 Performs DNS queries to domains with low reputation 29->112 114 Modifies the context of a thread in another process (thread injection) 29->114 116 Maps a DLL or memory area into another process 29->116 118 Tries to detect virtualization through RDTSC time measurements 29->118 36 cmd.exe 1 29->36         started        64 onedrive.live.com 31->64 70 2 other IPs or domains 31->70 120 Creates a thread in another existing process (thread injection) 31->120 122 Injects a PE file into a foreign processes 31->122 38 logagent.exe 31->38         started        signatures15 process16 signatures17 86 Modifies the context of a thread in another process (thread injection) 33->86 88 Maps a DLL or memory area into another process 33->88 90 Sample uses process hollowing technique 33->90 40 conhost.exe 36->40         started        process18
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2022-02-14 06:34:52 UTC
File Type:
PE (Exe)
Extracted files:
67
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:pvxz loader persistence rat suricata
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Blocklisted process makes network request
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
51abc2e98d5bd75b74bf30aab05092d714cf2ae43c55e9640c883293ca2d5db9
MD5 hash:
3337f2f040878565081d719c1fe3143e
SHA1 hash:
bb0a6a3f211d8f05c108315d393710b357d54879
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 51abc2e98d5bd75b74bf30aab05092d714cf2ae43c55e9640c883293ca2d5db9

(this sample)

  
Dropped by
Formbook
  
Delivery method
Distributed via e-mail attachment

Comments