MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5fabffc9eb6177ac29a1e51bf2a8bde55ddd97e2f7c86134eb2512b927f1232e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 5fabffc9eb6177ac29a1e51bf2a8bde55ddd97e2f7c86134eb2512b927f1232e
SHA3-384 hash: ce08b0d84a9cfa73052304e67c0e8b11e196183f6071c6d0c280fc041b337793a2e70e2862a90d9a1758f1d6858aa0c3
SHA1 hash: 136c9c38a58ccbc9c6bebb48bba6100fc6eff206
MD5 hash: e339968bd4859d65b757ef83159b0488
humanhash: moon-lactose-november-sad
File name:Gkjesdjokhownhmnzenqhirureonvyzjao.exe
Download: download sample
Signature Formbook
File size:732'672 bytes
First seen:2022-08-08 09:37:35 UTC
Last seen:2022-08-09 06:05:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash cc1fadbd23c2bfd0a0322aa7e67d1d3f (4 x DBatLoader, 3 x Formbook, 1 x RemcosRAT)
ssdeep 12288:KmhCsMYEubn0UsjX4gaYv+tdqw1xBXEtFSOUHU3PiyMcCd5sY3nk1Bz:xnMYEbTjfaxtdqQVESreixHfk1Bz
Threatray 14'586 similar samples on MalwareBazaar
TLSH T1FCF4AEF1F2D015F2DE222637C81A9E25E8257E10296C204FABE43DD85F7D6C2792F256
TrID 28.5% (.SCR) Windows screen saver (13101/52/3)
22.9% (.EXE) Win64 Executable (generic) (10523/12/4)
14.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win32 Executable (generic) (4505/5/1)
6.5% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon c730f4e4d4d830c7 (5 x DBatLoader, 3 x Formbook, 2 x RemcosRAT)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
3
# of downloads :
343
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Gkjesdjokhownhmnzenqhirureonvyzjao.exe
Verdict:
Malicious activity
Analysis date:
2022-08-08 09:40:24 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Launching cmd.exe command interpreter
Creating a process with a hidden window
Launching a process
Searching for synchronization primitives
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 680319 Sample: Gkjesdjokhownhmnzenqhirureo... Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 67 Malicious sample detected (through community Yara rule) 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 Yara detected UAC Bypass using ComputerDefaults 2->71 73 4 other signatures 2->73 10 Gkjesdjokhownhmnzenqhirureonvyzjao.exe 1 18 2->10         started        15 Gkjesdjok.exe 16 2->15         started        process3 dnsIp4 41 onedrive.live.com 10->41 43 exhs4q.am.files.1drv.com 10->43 45 am-files.fe.1drv.com 10->45 37 C:\Users\Public\Librariesbehaviorgraphkjesdjok.exe, PE32 10->37 dropped 39 C:\Users\...behaviorgraphkjesdjok.exe:Zone.Identifier, ASCII 10->39 dropped 75 Writes to foreign memory regions 10->75 77 Allocates memory in foreign processes 10->77 79 Creates a thread in another existing process (thread injection) 10->79 81 Injects a PE file into a foreign processes 10->81 17 cmd.exe 1 10->17         started        47 onedrive.live.com 15->47 49 exhs4q.am.files.1drv.com 15->49 51 am-files.fe.1drv.com 15->51 83 Multi AV Scanner detection for dropped file 15->83 85 Machine Learning detection for dropped file 15->85 20 cmd.exe 1 15->20         started        file5 signatures6 process7 signatures8 59 Modifies the context of a thread in another process (thread injection) 17->59 61 Maps a DLL or memory area into another process 17->61 63 Tries to detect virtualization through RDTSC time measurements 17->63 65 Queues an APC in another process (thread injection) 17->65 22 explorer.exe 17->22 injected 24 conhost.exe 17->24         started        26 conhost.exe 20->26         started        process9 process10 28 Gkjesdjok.exe 16 22->28         started        31 autofmt.exe 22->31         started        dnsIp11 53 onedrive.live.com 28->53 55 exhs4q.am.files.1drv.com 28->55 57 am-files.fe.1drv.com 28->57 33 cmd.exe 1 28->33         started        process12 process13 35 conhost.exe 33->35         started       
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2022-08-08 09:38:08 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:formbook family:modiloader campaign:o2e7 persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Formbook payload
Formbook
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 5fabffc9eb6177ac29a1e51bf2a8bde55ddd97e2f7c86134eb2512b927f1232e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments