MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51b2fe7ed5d6da110fe512ac143f26b29b8819b25f4540e93825d310d60d2511. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 51b2fe7ed5d6da110fe512ac143f26b29b8819b25f4540e93825d310d60d2511
SHA3-384 hash: 19d4d6f152f1e78251cb76e4fe5ab60e2fc5829ccde90642f8f100a8a664448cddd14b233f7e0a6ebc2965438f7e1ca7
SHA1 hash: 20623a673280a1170bf2c06de4395e598db0b3eb
MD5 hash: 6dd7773f1243d53e392e0d6c8f2c9b6d
humanhash: papa-venus-asparagus-delaware
File name:6dd7773f1243d53e392e0d6c8f2c9b6d.exe
Download: download sample
Signature FormBook
File size:559'616 bytes
First seen:2020-07-09 07:50:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9a50e73bc75a3005fac729605bdf4c02 (3 x FormBook, 3 x RemcosRAT, 2 x AveMariaRAT)
ssdeep 12288:/vldw9ecty5wgPvh3NQFoVvVLrkX6dtOFRlAfB3zBKzY:Xfw9DKth3NQFoDLrkXgtYRlAflz8
Threatray 5'331 similar samples on MalwareBazaar
TLSH 11C48F72F2D08937D12F1A79CD1B96A8583ABE103D28DC8A7BF52D4C5F39651343A1A3
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Exploit.BypassUac
Status:
Malicious
First seen:
2020-07-09 07:52:06 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Modifies Internet Explorer settings
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Adds Run entry to start application
Reads user/profile data of web browsers
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments