MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6140005553a006e1fc0f489312d1ba70c84851f9e9a503daaf9665c72c1684bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 6140005553a006e1fc0f489312d1ba70c84851f9e9a503daaf9665c72c1684bc |
|---|---|
| SHA3-384 hash: | 266c4c06bb55195afe1ac942dd08e65263782db84687e3832cec792a9979647f1f4efe8e219fdfeb62d92551a289dbf2 |
| SHA1 hash: | 203e61d0e28a1be834cfdb01a99f5f775dbad0d9 |
| MD5 hash: | 3e8c3834f4beddb299985d328f112324 |
| humanhash: | hydrogen-carolina-rugby-network |
| File name: | Dhl Colis.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 289'960 bytes |
| First seen: | 2022-11-16 18:00:26 UTC |
| Last seen: | 2022-11-19 06:17:53 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 29b61e5a552b3a9bc00953de1c93be41 (174 x Formbook, 82 x AgentTesla, 81 x Loki) |
| ssdeep | 6144:MEa0NsQ8e6GBNq9uFWQbPWr41g/hmFCdgEG64GKnr:XlHN9kQzxMh2+gEGBGKnr |
| TLSH | T1DD54125622C0EABBE282B5324757EF3FC6FD481472264B934BB0BE790758502AF253D5 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | DHL exe FormBook |
Intelligence
File Origin
# of uploads :
3
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Dhl Colis.exe
Verdict:
Malicious activity
Analysis date:
2022-11-16 18:04:34 UTC
Tags:
formbook trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Launching a process
DNS request
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process
Searching for synchronization primitives
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-11-16 18:01:09 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 26 (88.46%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
10/10
Tags:
family:formbook family:xloader campaign:fqsu loader rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Executes dropped EXE
Formbook
Xloader
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
bbc5a60f9140e40979a13d24e8fae142bff9140af94fe95cc1455160781aafbb
MD5 hash:
f13d54398929634fd143ef5ea8c6a3e3
SHA1 hash:
2c9224e7a169098f9c05f869746e84fb7f6fd928
Detections:
XLoader
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
fc1e9c9d0524f405aab192c521a553a1483ae0de315d3277a69402fdade05491
MD5 hash:
b2a5b0e0e70eb909712785ad6fd3d296
SHA1 hash:
cd4a580c6152738ecf553db9ec4fdc8673156f80
SH256 hash:
3de9bb5a01be39ffdcd353d8c7bffb46255703defc3f9fd5e8986e86b63abf9b
MD5 hash:
d499a892ed91fafa6e3df2b54b7b3804
SHA1 hash:
139035be0f5a89ee63f307785a3767a575ec774e
SH256 hash:
457fcca2410a2461d61d5d95c337a41da1391aaf9fb8c4f2b7783dce249054a4
MD5 hash:
4f6bc7fbe5ad61a8e4fea0acc0f3d057
SHA1 hash:
d2ba6e3fa8481c53fbca9ff5611aa2e0b8635484
SH256 hash:
6140005553a006e1fc0f489312d1ba70c84851f9e9a503daaf9665c72c1684bc
MD5 hash:
3e8c3834f4beddb299985d328f112324
SHA1 hash:
203e61d0e28a1be834cfdb01a99f5f775dbad0d9
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.