MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6b00eb5193d6583e02b9a0b900db5e696da561cf8d368ede6e257c7aa6cb7643. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 6b00eb5193d6583e02b9a0b900db5e696da561cf8d368ede6e257c7aa6cb7643
SHA3-384 hash: c95f51d4a48b498c001ba808ad818224fda10218e7bb10a1cf0496fd824f312ecb286a1d3186a5201d59df0b5ec974bb
SHA1 hash: ccda57b593d5735166dd19425a07c06caa5bad60
MD5 hash: 0a3543a36a0db35b71e0c7275036a636
humanhash: west-foxtrot-mississippi-beryllium
File name:RFQ-Ref.No. 07-03-2022.vbs
Download: download sample
Signature Formbook
File size:2'865 bytes
First seen:2022-03-08 12:36:36 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 48:kKMxszFNmTVxa7NIm8wfIMLhLFMYkSIo/e/HLNG0QkgqqFL6jsDy80BdO:aeNmTKxIm8kIsLFj0o/e/HpA8qRLbr
Threatray 13'980 similar samples on MalwareBazaar
TLSH T1F051559A3007A57420263EF1EC1B449E96B15743B2BCA851794CC3E6CFB605CE78394E
Reporter abuse_ch
Tags:FormBook vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Command shell drops VBS files
DLL side loading technique detected
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Very long command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 585046 Sample: RFQ-Ref.No. 07-03-2022.vbs Startdate: 08/03/2022 Architecture: WINDOWS Score: 100 64 Malicious sample detected (through community Yara rule) 2->64 66 Antivirus detection for URL or domain 2->66 68 Multi AV Scanner detection for submitted file 2->68 70 5 other signatures 2->70 9 wscript.exe 14 2->9         started        13 wscript.exe 2->13         started        15 wscript.exe 13 2->15         started        process3 dnsIp4 60 ozelfanteziiplik.com 78.142.29.185, 49733, 49737, 49742 VERDINABZ Bulgaria 9->60 82 System process connects to network (likely due to code injection or exploit) 9->82 84 Wscript starts Powershell (via cmd or directly) 9->84 86 Very long command line found 9->86 88 2 other signatures 9->88 17 powershell.exe 14 21 9->17         started        22 cmd.exe 3 9->22         started        24 powershell.exe 13->24         started        62 192.168.2.1 unknown unknown 15->62 26 powershell.exe 15->26         started        signatures5 process6 dnsIp7 54 ozelfanteziiplik.com 17->54 48 C:\Users\user\AppData\...\AgileDotNetRT64.dll, PE32+ 17->48 dropped 72 Writes to foreign memory regions 17->72 74 DLL side loading technique detected 17->74 76 Injects a PE file into a foreign processes 17->76 78 Powershell drops PE file 17->78 28 RegAsm.exe 17->28         started        31 conhost.exe 17->31         started        50 RFQ-Ref.No. 07-03-...vbs:Zone.Identifier, ASCII 22->50 dropped 52 C:\Users\user\...\RFQ-Ref.No. 07-03-2022.vbs, ASCII 22->52 dropped 80 Command shell drops VBS files 22->80 33 conhost.exe 22->33         started        56 ozelfanteziiplik.com 24->56 35 RegAsm.exe 24->35         started        37 conhost.exe 24->37         started        58 ozelfanteziiplik.com 26->58 39 RegAsm.exe 26->39         started        41 conhost.exe 26->41         started        file8 signatures9 process10 signatures11 90 Modifies the context of a thread in another process (thread injection) 28->90 92 Maps a DLL or memory area into another process 28->92 94 Sample uses process hollowing technique 28->94 96 2 other signatures 28->96 43 explorer.exe 28->43 injected process12 process13 45 svchost.exe 43->45         started        signatures14 98 Tries to detect virtualization through RDTSC time measurements 45->98
Threat name:
Script-WScript.Trojan.Phonzy
Status:
Malicious
First seen:
2022-03-08 12:37:10 UTC
File Type:
Text (VBS)
AV detection:
11 of 27 (40.74%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:s32s loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Blocklisted process makes network request
Xloader Payload
Xloader
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Visual Basic Script (vbs) vbs 6b00eb5193d6583e02b9a0b900db5e696da561cf8d368ede6e257c7aa6cb7643

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments