MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8e36abaf554e37c743a7874d53dcc57751e88be673ac98c5abaa873984cb6e23. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 9
| SHA256 hash: | 8e36abaf554e37c743a7874d53dcc57751e88be673ac98c5abaa873984cb6e23 |
|---|---|
| SHA3-384 hash: | bda93e261ce4419649b8b8fa8df6df011d8b7da6ec8a1a0c9da907e98f489fde25e035230133b1a5aaab9aa41cbe4a2b |
| SHA1 hash: | 570f5297e16123ce27ff864f3b955f6cf3553c04 |
| MD5 hash: | 97d30b37b8219e14f38b78920223a8fa |
| humanhash: | grey-beer-green-rugby |
| File name: | Maersk Line Shipment Documents.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 200'599 bytes |
| First seen: | 2021-07-08 10:22:45 UTC |
| Last seen: | 2021-07-08 10:53:03 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 6e7f9a29f2c85394521a08b9f31f6275 (293 x GuLoader, 51 x VIPKeylogger, 48 x RemcosRAT) |
| ssdeep | 6144:xMm4CCAfqW/T1b1VtdJftH6zuq1hBT0k1:xMwRfqM1dJft+xBTl |
| Threatray | 5'844 similar samples on MalwareBazaar |
| TLSH | T17514010532E8C8ABD5722E721D3AABAB2EF8B53408A10F0B57A457CD7513791EC4D396 |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
119
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Maersk Line Shipment Documents.exe
Verdict:
Malicious activity
Analysis date:
2021-07-08 10:26:23 UTC
Tags:
trojan formbook stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Executable has a suspicious name (potential lure to open the executable)
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2021-07-08 04:11:30 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
18 of 29 (62.07%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 5'834 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Unpacked files
SH256 hash:
418aba5b51171cfb46b94e20a5a833950d921fdb4e6ec70616fb0ccd088441b7
MD5 hash:
36b3d7438852c4bee0dd511e49cd06d3
SHA1 hash:
d1bba78ca9854facdb0c33a93663b3734c13084f
Detections:
win_formbook_g0
win_formbook_auto
SH256 hash:
99d14753271f254becce6ad71bde67b1c3fbf34dcba0c8215b4a9bc1b7549b92
MD5 hash:
6b1d068a835ac383a446d0d5d0a86796
SHA1 hash:
f4b2e5788fa69a349853ed6be1178093729b9e9e
SH256 hash:
1fc3f71a783ded3808dacec63a645f98666268c6791d7a490e11d9b8d0e1cfb3
MD5 hash:
f6186bbe4a7a6eaf64dbf412a51ce48e
SHA1 hash:
16e8a6fb967e12f9911e613dbac80783acf8f379
SH256 hash:
8e36abaf554e37c743a7874d53dcc57751e88be673ac98c5abaa873984cb6e23
MD5 hash:
97d30b37b8219e14f38b78920223a8fa
SHA1 hash:
570f5297e16123ce27ff864f3b955f6cf3553c04
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.47
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.