MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6c63e68f6d116d78c115e15d1c1bdaeb1064cb562de15c4f5d46142e637f26e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 11
| SHA256 hash: | 6c63e68f6d116d78c115e15d1c1bdaeb1064cb562de15c4f5d46142e637f26e3 |
|---|---|
| SHA3-384 hash: | b36183840cc845fa101e587ff7ae757017aa95d52c15cd310b9156cc50935d1fb58f222a755375cc36af83643c011583 |
| SHA1 hash: | e689e98a99d1d2a6e9a67a6adbd7fba737ed2d6b |
| MD5 hash: | ab87bb7551411aec9c0b27cb4dcca79e |
| humanhash: | avocado-hot-early-wisconsin |
| File name: | inz.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 421'376 bytes |
| First seen: | 2021-01-12 22:45:10 UTC |
| Last seen: | 2021-01-13 01:01:39 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 6d78c203697582a336c7a0a9d7775a1b (5 x Formbook, 1 x RemcosRAT, 1 x AgentTesla) |
| ssdeep | 6144:t/hXM6TGfaXeRGjwj9qsgEtBI/IJQSv38gRxZcE7vnpAWYRlmHXL8UjPS0h7m5pg:LXMXFUsgEz3KEuXmHXjTSeIbewGZo7Sj |
| Threatray | 241 similar samples on MalwareBazaar |
| TLSH | EA946C26B788F6AAE18100B47109FFB650613835692EC843F7C17B5B78721EE9A05F5F |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5207406442479616.zip
Verdict:
Suspicious activity
Analysis date:
2021-01-08 12:52:38 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Unauthorized injection to a recently created process
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
formbook
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2021-01-05 07:11:31 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
2/5
Verdict:
unknown
Similar samples:
+ 231 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.nationshiphop.com/hko6/
Unpacked files
SH256 hash:
6c63e68f6d116d78c115e15d1c1bdaeb1064cb562de15c4f5d46142e637f26e3
MD5 hash:
ab87bb7551411aec9c0b27cb4dcca79e
SHA1 hash:
e689e98a99d1d2a6e9a67a6adbd7fba737ed2d6b
SH256 hash:
0e42bcab0a57e397c71f229d32f9408c22bdd22ec95142250f1eaeef1f7c0d11
MD5 hash:
9a1b5b5d3f244f5ff2089c39394ab4b1
SHA1 hash:
fc02eb679825cc74c063d7fc4eaad3e79152fb3d
Detections:
win_formbook_g0
win_formbook_auto
SH256 hash:
263a48f576b7798c89574796a7257c441ce60783c93023af8aff28088e0b47a0
MD5 hash:
594b2ddb2e6517ba02461b7c1673ebc3
SHA1 hash:
e44bd722d458fa1a32c97529cb4633987e220581
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.