MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6023812166224ffe7f3ff3efacddccd27c4ae1f09aa2dc9e2f5c8557d6bb4382. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 6023812166224ffe7f3ff3efacddccd27c4ae1f09aa2dc9e2f5c8557d6bb4382
SHA3-384 hash: 3e6490b630f50306234ade96b61b8b34f1ba08b1a28a9baea38923996fc0a3ec638d4be59699e8de3fb98fecc2d21e83
SHA1 hash: e40c6809253127c918848e2db3173205c12d3def
MD5 hash: c3782f33095e240a6c570b8d1265eaa4
humanhash: black-diet-high-august
File name:NEW ORDER APPROVED_PDF.exe
Download: download sample
Signature FormBook
File size:377'344 bytes
First seen:2020-07-13 13:32:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'743 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 6144:xzj3m4NJnWrHEnG8mS+UZx2NwHjsaXQb3GGTJL8jjz:3JuQmHUX2qXWZL8
Threatray 5'125 similar samples on MalwareBazaar
TLSH 9F84F03862D84F93C6779BFA28E5191033BF69139FA3F24C4ED990C90444BA5ECA1D97
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Enabling the 'hidden' option for analyzed file
Unauthorized injection to a recently created process
Launching cmd.exe command interpreter
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-07-12 23:10:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
28 of 48 (58.33%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
trojan spyware stealer family:formbook persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Adds Run entry to start application
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Executes dropped EXE
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments