MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f7ceadb0d2fed6b1c7fed3f479dad5a0e6e91263ae9fb0d5d97b811c1fb90c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 6f7ceadb0d2fed6b1c7fed3f479dad5a0e6e91263ae9fb0d5d97b811c1fb90c4
SHA3-384 hash: b0a81e9039a447cb2dc6f8ca5cd259939eec362cbb34e6fb5fe058353d988eb90e0ac8e5a98f29f7d00799c71fc00b96
SHA1 hash: 19f15ca7fa694c0397c3ec2a8eb0fad869c50774
MD5 hash: aefb311702d85f433019a505252246ef
humanhash: massachusetts-nineteen-west-august
File name:ALFA.exe
Download: download sample
Signature FormBook
File size:823'808 bytes
First seen:2020-07-21 09:31:59 UTC
Last seen:2020-07-21 11:24:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:CMUJBc7nX4UhUCtpkdzdKzLSwghER4urGNwZcP1L8HFcf:CMUWptphSlurKwZQ5iFc
Threatray 5'218 similar samples on MalwareBazaar
TLSH BA059E553502DD42C2F61276C8DF845447BCAC82697AD78A3B5B33EA25217E3EC0A6CF
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: server.megatroncorp.community
Sending IP: 162.241.205.158
From: Hernán F. Lozano <server@huttprimax.partners>
Reply-To: alfa@qualityservice.com
Subject: ALFA // INVESTIGACIÓN // 20.7.2020
Attachment: ALFA INVESTIGACIN.zip (contains "ALFA.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 248813 Sample: ALFA.exe Startdate: 21/07/2020 Architecture: WINDOWS Score: 100 38 www.ashoksoota.com 2->38 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected FormBook 2->50 52 2 other signatures 2->52 11 ALFA.exe 3 2->11         started        signatures3 process4 file5 36 C:\Users\user\AppData\Local\...\ALFA.exe.log, ASCII 11->36 dropped 64 Tries to detect virtualization through RDTSC time measurements 11->64 66 Injects a PE file into a foreign processes 11->66 15 ALFA.exe 11->15         started        signatures6 process7 signatures8 68 Modifies the context of a thread in another process (thread injection) 15->68 70 Maps a DLL or memory area into another process 15->70 72 Sample uses process hollowing technique 15->72 74 Queues an APC in another process (thread injection) 15->74 18 explorer.exe 15->18 injected process9 dnsIp10 40 jointventurementors.com 34.102.136.180, 49716, 80 GOOGLEUS United States 18->40 42 www.jointventurementors.com 18->42 44 2 other IPs or domains 18->44 54 System process connects to network (likely due to code injection or exploit) 18->54 22 wlanext.exe 1 18 18->22         started        signatures11 process12 file13 30 C:\Users\user\AppData\...\946logrv.ini, data 22->30 dropped 32 C:\Users\user\AppData\...\946logri.ini, data 22->32 dropped 34 C:\Users\user\AppData\...\946logrf.ini, data 22->34 dropped 56 Detected FormBook malware 22->56 58 Tries to steal Mail credentials (via file access) 22->58 60 Tries to harvest and steal browser information (history, passwords, etc) 22->60 62 3 other signatures 22->62 26 cmd.exe 1 22->26         started        signatures14 process15 process16 28 conhost.exe 26->28         started       
Threat name:
ByteCode-MSIL.Trojan.Occamy
Status:
Malicious
First seen:
2020-07-21 09:33:04 UTC
AV detection:
30 of 48 (62.50%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
trojan spyware stealer family:formbook persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
Deletes itself
Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 6f7ceadb0d2fed6b1c7fed3f479dad5a0e6e91263ae9fb0d5d97b811c1fb90c4

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments