MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 9
| SHA256 hash: | 6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829 |
|---|---|
| SHA3-384 hash: | 29e786d2c434292d6b7bdcf928ad6ef37b7860d5a06719b5ea97b48a54f0ab51f7195d051a199e02f00231b00855000d |
| SHA1 hash: | e1844334a3627508f7c988d41883d8533bc42617 |
| MD5 hash: | a22175e04cd0fb0bf58a15b2eb6ab978 |
| humanhash: | crazy-ten-uniform-wyoming |
| File name: | RFQ-Haesung-tech-견적요청_해성190918.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 827'904 bytes |
| First seen: | 2020-11-19 06:48:56 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f19034443dbba8ae65cae64d05fef57a (13 x Loki, 3 x Formbook, 2 x AgentTesla) |
| ssdeep | 12288:AbkNnMdUO4rvcMZKwangiFPWY/mnM44ZVA0hjQYonCrNAsZRrPNbZ:p6j4rvrKwang6WCxVA0d6CRAsLPNbZ |
| Threatray | 2'976 similar samples on MalwareBazaar |
| TLSH | 7E059E6FA1F0483FC12316399C1B57A85D36BE10F92869462BF41D4C9F39A9178272BF |
| Reporter | |
| Tags: | exe FormBook geo KOR |
abuse_ch
Malspam distributing unidentified malware:HELO: ns.asakurasoft9.jp
Sending IP: 211.1.230.21
From: Haesung Tech Co., Ltd <giga-tech@daum.net>
Reply-To: giga-tech@daum.net
Subject: 조언: Request for quotation _ Haesung Tech
Attachment: RFQ-Haesung-tech-견적요청_해성190918.img (contains "RFQ-Haesung-tech-견적요청_해성190918.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
115
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Launching a process
Launching cmd.exe command interpreter
DNS request
Sending an HTTP GET request
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Found evasive API chain (may execute only at specific dates)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-11-19 05:05:37 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
netwirerc
Similar samples:
+ 2'966 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.sunflowersbikini.com/o1u9/
Unpacked files
SH256 hash:
6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829
MD5 hash:
a22175e04cd0fb0bf58a15b2eb6ab978
SHA1 hash:
e1844334a3627508f7c988d41883d8533bc42617
SH256 hash:
63f19caf7c1b22ec4856b64cbfad0368755d7d917c5df022566b1b1f458a48f1
MD5 hash:
0a1360928d9421ecee80cc918fa7b9c3
SHA1 hash:
1ff361e0b52e323a16040767a1730eddfd8420b3
Detections:
win_formbook_g0
win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.