MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829
SHA3-384 hash: 29e786d2c434292d6b7bdcf928ad6ef37b7860d5a06719b5ea97b48a54f0ab51f7195d051a199e02f00231b00855000d
SHA1 hash: e1844334a3627508f7c988d41883d8533bc42617
MD5 hash: a22175e04cd0fb0bf58a15b2eb6ab978
humanhash: crazy-ten-uniform-wyoming
File name:RFQ-Haesung-tech-견적요청_해성190918.exe
Download: download sample
Signature Formbook
File size:827'904 bytes
First seen:2020-11-19 06:48:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f19034443dbba8ae65cae64d05fef57a (13 x Loki, 3 x Formbook, 2 x AgentTesla)
ssdeep 12288:AbkNnMdUO4rvcMZKwangiFPWY/mnM44ZVA0hjQYonCrNAsZRrPNbZ:p6j4rvrKwang6WCxVA0d6CRAsLPNbZ
Threatray 2'976 similar samples on MalwareBazaar
TLSH 7E059E6FA1F0483FC12316399C1B57A85D36BE10F92869462BF41D4C9F39A9178272BF
Reporter abuse_ch
Tags:exe FormBook geo KOR


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: ns.asakurasoft9.jp
Sending IP: 211.1.230.21
From: Haesung Tech Co., Ltd <giga-tech@daum.net>
Reply-To: giga-tech@daum.net
Subject: 조언: Request for quotation _ Haesung Tech
Attachment: RFQ-Haesung-tech-견적요청_해성190918.img (contains "RFQ-Haesung-tech-견적요청_해성190918.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
115
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Launching a process
Launching cmd.exe command interpreter
DNS request
Sending an HTTP GET request
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Found evasive API chain (may execute only at specific dates)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-11-19 05:05:37 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.sunflowersbikini.com/o1u9/
Unpacked files
SH256 hash:
6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829
MD5 hash:
a22175e04cd0fb0bf58a15b2eb6ab978
SHA1 hash:
e1844334a3627508f7c988d41883d8533bc42617
SH256 hash:
63f19caf7c1b22ec4856b64cbfad0368755d7d917c5df022566b1b1f458a48f1
MD5 hash:
0a1360928d9421ecee80cc918fa7b9c3
SHA1 hash:
1ff361e0b52e323a16040767a1730eddfd8420b3
Detections:
win_formbook_g0 win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 6ea42d461e10aa280c9a3bf273e6edfd0cf92a916f35768546ef7f09484c0829

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments