MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 612a346d3e2412113c53343b67419bc7a13bcf1bfe890137b68b3b5553a20096. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | 612a346d3e2412113c53343b67419bc7a13bcf1bfe890137b68b3b5553a20096 |
|---|---|
| SHA3-384 hash: | 9503663df9ab07324f75c2e3765447ef55db297e8d5264f228567f5116c96f3bf198c3d21faec042e3ced8e58f189df9 |
| SHA1 hash: | b6a2abfaaffbb3560dc9ebae6f3bd14aa0594b44 |
| MD5 hash: | 3737a705b553c9a6245722aa948a2beb |
| humanhash: | asparagus-bravo-avocado-don |
| File name: | 3737a705b553c9a6245722aa948a2beb.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 433'561 bytes |
| First seen: | 2021-10-12 12:04:16 UTC |
| Last seen: | 2021-10-12 13:03:08 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger) |
| ssdeep | 6144:VBlL/ideqEZ6AVoZcSJGr9TB0PvQqlKxOwCOnPj+p9sHRBNmoJke6:DRvrVpovkEQnPip6HdMP |
| Threatray | 10'517 similar samples on MalwareBazaar |
| TLSH | T17594D505C1D4894ECC3A2DBAC28F9ED0D22B4CDA6B4B5DCE1D227DEA75B71C188127D9 |
| File icon (PE): | |
| dhash icon | d48cb8a8e8d4c0cc (1 x Formbook) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
190
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3737a705b553c9a6245722aa948a2beb.exe
Verdict:
Malicious activity
Analysis date:
2021-10-12 21:00:35 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a window
Verdict:
Suspicious
Threat level:
5/10
Confidence:
60%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Self deletion via cmd delete
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Suspicious Rundll32 Without Any CommandLine Params
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
xloader
Threat name:
Win32.Trojan.Nsisx
Status:
Malicious
First seen:
2021-10-12 12:05:14 UTC
AV detection:
10 of 37 (27.03%)
Threat level:
5/5
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 10'507 additional samples on MalwareBazaar
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:b2c0 loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.thesewhitevvalls.com/b2c0/
Unpacked files
SH256 hash:
82ba6d3067cb05d9f009b370ce4bbc984f232ee3eff0df56ab89deeeb09d7003
MD5 hash:
2087789d2e9274a309cbc3d2548d9e45
SHA1 hash:
6ac8a85a52bd982015a07b50e9a89c5c0a7e4f66
SH256 hash:
ada6701c3577dfc968d29951e11435733ed201c228d21d05dffaf26fba9be80b
MD5 hash:
00950d2c2f77713a0bb9a84b022a27b8
SHA1 hash:
642f8c60a60249208e8920c78773f88b047b2951
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
d4c21ca2b5cdaff37a3ea21f2750eb5a81add47d40c3f7f6e1391be445ef6c91
MD5 hash:
b3cad943335ace9f5fa88d1eaac00dd2
SHA1 hash:
4a9a0f017f68dfd82ea535ea542b60b640b0c955
SH256 hash:
612a346d3e2412113c53343b67419bc7a13bcf1bfe890137b68b3b5553a20096
MD5 hash:
3737a705b553c9a6245722aa948a2beb
SHA1 hash:
b6a2abfaaffbb3560dc9ebae6f3bd14aa0594b44
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.47
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.