MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5844c46897bed7fe14055a67a96610d8f81d68af270d698a600bb234bf813653. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | 5844c46897bed7fe14055a67a96610d8f81d68af270d698a600bb234bf813653 |
|---|---|
| SHA3-384 hash: | 74dc730bd3d165a36d0ff7eb3af9c53bb6025886ee3a9f5d696ffe399b54fdd3b012b3792f73ddd97eaffc3f93f391b1 |
| SHA1 hash: | b789bdedd888ee518d5bd3d1b7cec93289c48dd8 |
| MD5 hash: | 611cb3315da712f16af1dff657f62097 |
| humanhash: | pizza-comet-venus-queen |
| File name: | 611cb3315da712f16af1dff657f62097.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 993'280 bytes |
| First seen: | 2021-01-19 12:13:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 12288:z3+2q8pKkzgkRaz5T2dW+5n3+RcgmcaOi/CIn6w1:vq8pNRKSnuRckap/CIn6w1 |
| Threatray | 3'564 similar samples on MalwareBazaar |
| TLSH | 4525481427AD8F54F2FA87F812639A4093F72E0B921AE64D4C823DF6367DB830945797 |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
http://algreenstdykegheedst.dns.navy/aledoc/winlog.exe
Verdict:
Malicious activity
Analysis date:
2021-01-19 12:14:03 UTC
Tags:
opendir loader trojan formbook stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM_3
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
formbook
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-01-19 12:14:09 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 3'554 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.theatomicshots.com/xle/
Unpacked files
SH256 hash:
1fa7ef7be1c4343628e13635a51011631905dd6727ca166da53c9c9765ffed8c
MD5 hash:
1d579806d94f4c43fcdd13baadeb1c32
SHA1 hash:
18b56c5c8da39428246f0d5f8e124bca9c29e032
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
b717c2b6370565b6a1d8339d0b2d7c56f1e47eeb74dbdf10cc2ab9273730b5f8
MD5 hash:
a44fe62278c60531946a6dcdd06b63a4
SHA1 hash:
a2db7673ae2c0540509c40de6d2ece8a6dd6de68
SH256 hash:
3f02dfd0b0cd9600617166c46a3eb09b07837b6e718a02677ea03cf2e909e1a4
MD5 hash:
2057e405d27ad310375457e7a9354b42
SHA1 hash:
34463f0ded3acac785af00ae9d61227cb4d0be5c
SH256 hash:
5844c46897bed7fe14055a67a96610d8f81d68af270d698a600bb234bf813653
MD5 hash:
611cb3315da712f16af1dff657f62097
SHA1 hash:
b789bdedd888ee518d5bd3d1b7cec93289c48dd8
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Remcos
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.