MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 694f9f8f9d78da1cb5eeea8b7ea8257b12f8d1c1216125610437f2b0c89e7881. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | 694f9f8f9d78da1cb5eeea8b7ea8257b12f8d1c1216125610437f2b0c89e7881 |
|---|---|
| SHA3-384 hash: | 773c34757e167eda3d44ddc6efb103be2e4cad3e965258da42b9708f432cf34b8b70e113a49ccd3a2bb7e2e01e20a126 |
| SHA1 hash: | 734af7a4137ce49dea6a8478094ebf31917f9a1b |
| MD5 hash: | 17325ac04d71ec597fc9bbe382ed3f5e |
| humanhash: | beryllium-potato-zebra-thirteen |
| File name: | Purchase order 86390 signed.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 690'176 bytes |
| First seen: | 2022-02-17 14:22:29 UTC |
| Last seen: | 2022-02-17 15:50:06 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 5e5a17bec1b45ecc76b26c84925a7c48 (1 x Formbook) |
| ssdeep | 12288:FCEkDVkgke3zK4O8ebFdui9l9bMnK9VF0i1K2KVVVVVVVVVVVVVVVVVVVVVVVVV1:FLAZke324aFsi9l9bMnK9F1KVVVVVVVN |
| Threatray | 16'085 similar samples on MalwareBazaar |
| TLSH | T13BE4AF22B2F28937C16B2DB49C6BC7F8942D7E112D2898473AD7AF0D5F3D64134261A7 |
| File icon (PE): | |
| dhash icon | f468cec4d4d4d4c4 (6 x Formbook, 1 x RemcosRAT, 1 x DBatLoader) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
3
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Launching the process to interact with network services
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe keylogger packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-02-17 08:11:20 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
28 of 42 (66.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 16'075 additional samples on MalwareBazaar
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:nqni loader persistence rat suricata
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Adds Run key to start application
Blocklisted process makes network request
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
bc5eab9035807d258b611c670dbc460e72b99b22c65bc13dde5e3a2c4c8c9613
MD5 hash:
721f31a2cfa45743fbbe5d65d907a254
SHA1 hash:
dc17bf82ddd688e93af709465a171cc275dc6ba1
Detections:
win_dbatloader_w0
Parent samples :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 hash:
694f9f8f9d78da1cb5eeea8b7ea8257b12f8d1c1216125610437f2b0c89e7881
MD5 hash:
17325ac04d71ec597fc9bbe382ed3f5e
SHA1 hash:
734af7a4137ce49dea6a8478094ebf31917f9a1b
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.