MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 700f8405954cf77a38e6b103b33e4c7164202e9126b3b76044be35510b2bf440. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 700f8405954cf77a38e6b103b33e4c7164202e9126b3b76044be35510b2bf440
SHA3-384 hash: 456febe5ce604c950dbad4ae5ec153c097c45b973adf6a441aad10b1b2fb6fab7783389b03e537d1e0881a1217a9ae7d
SHA1 hash: 45ef4f7c3fbf416e956a2974ed9b69fcb342ab0c
MD5 hash: 3bffbc1aae2b94b1b4c6cc406e1d8ff5
humanhash: oxygen-tennis-river-artist
File name:New Order.exe
Download: download sample
Signature FormBook
File size:765'952 bytes
First seen:2020-08-18 12:49:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:KJSQaMRYCadBenlSvLUzgbN6Lu9V+dFXpHUUrGaP:qRxaxzUzeN6Lu9V+dFXlUm
Threatray 2'240 similar samples on MalwareBazaar
TLSH F4F49E916148B8D5D16B2B344C36A971027EBEE92220C61C3E47336B8973F57272BD8F
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Malspam distributing FormBook:

HELO: sg1.productsgood.com
Sending IP: 45.125.192.99
From: Sanda Kozinda <support@haisokbr.go.th>
Subject: Re: Re AW: AW: Order
Attachment: New Order.rar (contains "New Order.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Launching the process to change network settings
Launching cmd.exe command interpreter
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2020-08-18 05:51:00 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
rat trojan spyware stealer family:formbook
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.chemoly.com/dth/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

FormBook

Executable exe 700f8405954cf77a38e6b103b33e4c7164202e9126b3b76044be35510b2bf440

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments