MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7080315530bc6d7ead65034c1587e4596d9dbf0fc17107fbb28f84bf016009f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FormBook


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments 1

SHA256 hash: 7080315530bc6d7ead65034c1587e4596d9dbf0fc17107fbb28f84bf016009f9
SHA3-384 hash: 0a164dfcdfc86f92ce4f94fa9b861ef65fbec33c86bc07f66df27667843aec8fc28ed1eb367131bf0d27e9634d88e4fe
SHA1 hash: 57f083ea441e1a67c2c1a99d264474ee49388fe7
MD5 hash: 61f55bceba5b9a52c750555d62fc7ae9
humanhash: asparagus-oscar-aspen-nebraska
File name:61f55bceba5b9a52c750555d62fc7ae9
Download: download sample
Signature FormBook
File size:996'352 bytes
First seen:2021-10-21 18:40:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ac55f6686b1348553fd9b5d485943699 (5 x Formbook, 4 x RemcosRAT)
ssdeep 12288:fDug7DeIhyEzPsO4z+oxMOQWHphA3hHx8rkRZQ9XYBk9NAOe6k1+hO/O5N8DoQTa:rt7JhyEz0O4z+OQK79HHQT2ODA
Threatray 9'023 similar samples on MalwareBazaar
TLSH T1FB258DB0A4CA49BAD0067DB998380879AD7F7E643A26510E4FCCFE191FF93C79432495
File icon (PE):PE icon
dhash icon 36f0390284e2da70 (12 x RemcosRAT, 7 x Formbook, 1 x OskiStealer)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
228
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Execution from Suspicious Folder
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 507244 Sample: FW16AjfCgs Startdate: 21/10/2021 Architecture: WINDOWS Score: 100 59 www.shock.agency 2->59 61 www.pourtonmobile.com 2->61 77 Malicious sample detected (through community Yara rule) 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 Yara detected FormBook 2->81 83 3 other signatures 2->83 10 FW16AjfCgs.exe 1 21 2->10         started        signatures3 process4 dnsIp5 63 onedrive.live.com 10->63 65 am-files.fe.1drv.com 10->65 67 3jaqfq.am.files.1drv.com 10->67 45 C:\Users\Public\Ajihoe.exe, PE32 10->45 dropped 89 Drops PE files to the user root directory 10->89 91 Writes to foreign memory regions 10->91 93 Creates a thread in another existing process (thread injection) 10->93 95 Injects a PE file into a foreign processes 10->95 15 secinit.exe 10->15         started        18 cmd.exe 1 10->18         started        20 cmd.exe 1 10->20         started        file6 signatures7 process8 signatures9 97 Modifies the context of a thread in another process (thread injection) 15->97 99 Maps a DLL or memory area into another process 15->99 101 Tries to detect virtualization through RDTSC time measurements 15->101 103 Queues an APC in another process (thread injection) 15->103 22 explorer.exe 2 15->22 injected 24 reg.exe 1 18->24         started        26 conhost.exe 18->26         started        28 cmd.exe 1 20->28         started        30 conhost.exe 20->30         started        process10 process11 32 Ajihoe.exe 15 22->32         started        36 Ajihoe.exe 16 22->36         started        38 conhost.exe 24->38         started        40 conhost.exe 28->40         started        dnsIp12 47 onedrive.live.com 32->47 49 am-files.fe.1drv.com 32->49 51 3jaqfq.am.files.1drv.com 32->51 69 Multi AV Scanner detection for dropped file 32->69 71 Writes to foreign memory regions 32->71 73 Creates a thread in another existing process (thread injection) 32->73 42 secinit.exe 32->42         started        53 onedrive.live.com 36->53 55 am-files.fe.1drv.com 36->55 57 3jaqfq.am.files.1drv.com 36->57 75 Injects a PE file into a foreign processes 36->75 signatures13 process14 signatures15 85 Modifies the context of a thread in another process (thread injection) 42->85 87 Maps a DLL or memory area into another process 42->87
Threat name:
Win32.Downloader.FormBook
Status:
Malicious
First seen:
2021-10-21 18:41:07 UTC
AV detection:
13 of 44 (29.55%)
Threat level:
  3/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:og2w persistence rat spyware stealer suricata trojan
Behaviour
Modifies Internet Explorer settings
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
Malware Config
C2 Extraction:
http://www.wakecountyrealtyexpert.com/og2w/
Unpacked files
SH256 hash:
651d2f39c341c86341babbf45e367c1fe183f49348f3816f91920e08ed057d2a
MD5 hash:
100b966ad7ecd1ba763f069d4f1c27d6
SHA1 hash:
630ce76fda48fa229e41cf3e5b70f21af8288af0
Detections:
win_temple_loader_w0
SH256 hash:
7080315530bc6d7ead65034c1587e4596d9dbf0fc17107fbb28f84bf016009f9
MD5 hash:
61f55bceba5b9a52c750555d62fc7ae9
SHA1 hash:
57f083ea441e1a67c2c1a99d264474ee49388fe7
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Formbook
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EnvVarScheduledTasks
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC (ab)using Environment Variables in Scheduled Tasks
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

FormBook

Executable exe 7080315530bc6d7ead65034c1587e4596d9dbf0fc17107fbb28f84bf016009f9

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-10-21 18:40:53 UTC

url : hxxp://103.167.84.65/explorer90/.vbc.exe