MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a3848cae066ae561f1d72908524838d32ad7c95bc18eb155d44211b2fac44fd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 6a3848cae066ae561f1d72908524838d32ad7c95bc18eb155d44211b2fac44fd
SHA3-384 hash: bfea01bddc00f989b07c589c55fb1699a7d49ed091292fc3e200f2d1c9789bd48f7c3ad7265a88bda4b8452ac43850d3
SHA1 hash: 0f096b9d5243db5df6334f2ee48c6c36a85487f3
MD5 hash: 87bce73178ebd33a85dad3aef87fdb87
humanhash: pennsylvania-freddie-connecticut-bluebird
File name:JO.ps1
Download: download sample
Signature Formbook
File size:1'185'375 bytes
First seen:2022-05-09 12:59:55 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 12288:YzaY6mbDrzsu10V9jTJJcDi1Zu54caUQanBfmb9GQ5l2bi8U4IZapUjSaG38AkxC:OOVu1UW
Threatray 2'149 similar samples on MalwareBazaar
TLSH T1BB4551A3399F47F7DA260F51C26EF51014EE26BFBA8C8393D65275388B77181C163298
Reporter pr0xylife
Tags:FormBook ps1 xloader

Intelligence


File Origin
# of uploads :
1
# of downloads :
244
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
clean
Classification:
n/a
Score:
4 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Script-PowerShell.Infostealer.Heuristic
Status:
Malicious
First seen:
2022-05-09 13:00:08 UTC
File Type:
Text (PowerShell)
AV detection:
6 of 42 (14.29%)
Threat level:
  2/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:pnj6 loader rat suricata
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments