MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 65996ea370508dfd2177caf453f833b53ed343c95e93b4c000382ae261173c65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | 65996ea370508dfd2177caf453f833b53ed343c95e93b4c000382ae261173c65 |
|---|---|
| SHA3-384 hash: | 1818011c50521553df814d5e515e4ac13ee19542dc2af73b9ac8845deeb001ef3ab606d4084966cfd512a232995166af |
| SHA1 hash: | a8f7aef1e6166a5130dabf34c6f3c500576cd831 |
| MD5 hash: | 55c8bc0b67a2cc2df661cd65564110fa |
| humanhash: | idaho-finch-thirteen-three |
| File name: | 55c8bc0b67a2cc2df661cd65564110fa.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 234'631 bytes |
| First seen: | 2022-11-17 15:21:07 UTC |
| Last seen: | 2022-11-17 16:53:22 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 29b61e5a552b3a9bc00953de1c93be41 (174 x Formbook, 82 x AgentTesla, 81 x Loki) |
| ssdeep | 6144:MEa0NDTCYU+EEZg8ea6v9gvofQD1oFiK3IOUI:XDTCZ+EEu8/2OoWo3f |
| TLSH | T12634122332D2B8F7FA51987199A1D235E33B8E43821A2D9713D05FBCB9F1503591A3D2 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
55c8bc0b67a2cc2df661cd65564110fa.exe
Verdict:
Malicious activity
Analysis date:
2022-11-17 15:23:14 UTC
Tags:
formbook trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Launching a process
DNS request
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process
Searching for synchronization primitives
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-11-17 12:36:11 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:henz rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
0e269590075db8fae5f50fc93f05858bee15d0df70fded8257ea05d8dabddc9d
MD5 hash:
346661ca43cb88e99995cdd7c82e8451
SHA1 hash:
4c546b5e83e75342451908d42a3e393246595734
Detections:
XLoader
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
28b16f47301f54fa84b0bc5ac89a7af59689d9cef26c72dc46899e68d721927c
MD5 hash:
1a19d42acf93b01f6510ffca0eec3f99
SHA1 hash:
d3a5adc90c2bc1d9b99143800966295b8af46cb9
SH256 hash:
952c14d5b2eb6d34b494556debe09c0997e5ed402230eb39a2cc526b49a89bf6
MD5 hash:
bea7d5d31838abf568c3f2b7c97a1d3d
SHA1 hash:
aab0270db6a24c95b1242054f12e36aa3d3f39c9
SH256 hash:
65996ea370508dfd2177caf453f833b53ed343c95e93b4c000382ae261173c65
MD5 hash:
55c8bc0b67a2cc2df661cd65564110fa
SHA1 hash:
a8f7aef1e6166a5130dabf34c6f3c500576cd831
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.