MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 621b174ac7de9b3b3b7698769ba6a83577db9453c8a93da26491d0cbfadf9f62. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 10
| SHA256 hash: | 621b174ac7de9b3b3b7698769ba6a83577db9453c8a93da26491d0cbfadf9f62 |
|---|---|
| SHA3-384 hash: | e011475bc1cb072fc2dd5553102ecbb96681fc2f3ec6e6a73576e455747b5ff82181569ff5dada74906318aec6d4033e |
| SHA1 hash: | 82c13a966ec7e2e037c49ae1fa8779d0698e465d |
| MD5 hash: | 9c145d8a2dffa0eafb09c0978f4a2364 |
| humanhash: | nitrogen-alaska-muppet-early |
| File name: | Shipping documents FDW11341-6 .exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 330'071 bytes |
| First seen: | 2022-04-29 09:42:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56a78d55f3f7af51443e58e0ce2fb5f6 (728 x GuLoader, 451 x Formbook, 295 x Loki) |
| ssdeep | 6144:HNeZmPo4tFXm5Ikh/celbL/ZDXbxdbv2+cyBoyGArniWg9S:HNlPo4t1Dkh0eLXbXbv2+b8Wg0 |
| TLSH | T15B64121C3DD4C853CCD62A352D3B7A57EFFBB92A25208A4B1760BB9D7541B409B2E309 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook Shipping |
Intelligence
File Origin
# of uploads :
1
# of downloads :
250
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Shipping documents FDW11341-6 .exe
Verdict:
Malicious activity
Analysis date:
2022-04-29 09:44:50 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Executable has a suspicious name (potential lure to open the executable)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected Generic Dropper
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2022-04-25 19:23:02 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
30 of 42 (71.43%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
bc110d7bae12529cdc1e25394cfdfe68afbb960b7fc4bb7e807be92ed2c14479
MD5 hash:
53ee1d9de63729396cea5156950dbcb6
SHA1 hash:
20fc3377e7f481ad067ffc410e42a9469d041c03
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :
de730251e1e204e4ee22464f4638e2baa2c64ee9a9520180443f593497678c58
9a89f7d24e1bc1ca09e2a9ed6b123a5e34fd963b5ced315c49e2bce5ed6b4bcb
3be0ec47961daf00ad70c778e46eb97964a4a0c53b281e3ae7828c2ee79e0f62
cd36d02294b8ffd6ba8dfa8966dd74b69f4af77a3ad3e5e8688b22cba6d7802a
621b174ac7de9b3b3b7698769ba6a83577db9453c8a93da26491d0cbfadf9f62
c0aca9838fde50ce7f8d57a322812fe457914e6cd0f06337664b959c8f8bfd52
304602b81a7a20873c7e72eec0d2c97b5994890910db8f7f0e05025d468bed86
9a89f7d24e1bc1ca09e2a9ed6b123a5e34fd963b5ced315c49e2bce5ed6b4bcb
3be0ec47961daf00ad70c778e46eb97964a4a0c53b281e3ae7828c2ee79e0f62
cd36d02294b8ffd6ba8dfa8966dd74b69f4af77a3ad3e5e8688b22cba6d7802a
621b174ac7de9b3b3b7698769ba6a83577db9453c8a93da26491d0cbfadf9f62
c0aca9838fde50ce7f8d57a322812fe457914e6cd0f06337664b959c8f8bfd52
304602b81a7a20873c7e72eec0d2c97b5994890910db8f7f0e05025d468bed86
SH256 hash:
1def8f18dc4fe88f2301d07005b35bba07b83f8a3e28cdf99adc480fc1ee1db3
MD5 hash:
2c6be90c0f026459b4aec223d77f78ee
SHA1 hash:
1a3be662b2eea0e726656eb80de54963edc89ff6
Detections:
win_mofksys_auto
SH256 hash:
fc844ce49c7801dec3eaac23f734d70613a5d975e4e0f06a6aa65e950b409865
MD5 hash:
1cd5a8616be828a0625645ed0ec8c929
SHA1 hash:
5a3de6a13f50bc32df6118ac92907d20e94c5f1c
SH256 hash:
b418a832a4ff94e8a5b76e763ca97af416c9355a4a7e5a2689d8bcceefcaa6de
MD5 hash:
55fb28a5743751280b7211ac16c6125a
SHA1 hash:
7cb219b0703b1a635ff99c42d55ebdee70089fea
SH256 hash:
621b174ac7de9b3b3b7698769ba6a83577db9453c8a93da26491d0cbfadf9f62
MD5 hash:
9c145d8a2dffa0eafb09c0978f4a2364
SHA1 hash:
82c13a966ec7e2e037c49ae1fa8779d0698e465d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.