MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 959b7ce61e82bc7f837042b10627c2d87442d52a243eafa8b837419ec0174418. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | 959b7ce61e82bc7f837042b10627c2d87442d52a243eafa8b837419ec0174418 |
|---|---|
| SHA3-384 hash: | 459479f4c1d4f38f5f2bd0e9e321fbc3ab324cfd4cc18198500c30c80a5fb7a90059cb765c2c7530af5da9555563abde |
| SHA1 hash: | 4abb7f77a640cea2982200a85b50262b6cc98fe3 |
| MD5 hash: | c8b74e4a2c66f86395db98ddca233936 |
| humanhash: | snake-eight-steak-tennessee |
| File name: | c8b74e4a2c66f86395db98ddca233936 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 256'654 bytes |
| First seen: | 2022-01-24 19:22:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 099c0646ea7282d232219f8807883be0 (476 x Formbook, 210 x Loki, 107 x AgentTesla) |
| ssdeep | 6144:ow/35B98f3j/ZuRw1uHOtWEe29lH5BUeI34VAtKMwaRLc:bJIznA6z9lHPUeI34VWb1o |
| Threatray | 13'046 similar samples on MalwareBazaar |
| TLSH | T18C44130B70E488FBE5E74AF22873C938D7BEB7166B2901470B25AF7B5452393264B351 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | 32 exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
189
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
DNS request
Verdict:
Suspicious
Threat level:
5/10
Confidence:
80%
Tags:
control.exe lokibot overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Self deletion via cmd delete
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
xloader
Threat name:
Win32.Trojan.Spynoon
Status:
Malicious
First seen:
2022-01-24 13:10:06 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
21 of 28 (75.00%)
Threat level:
5/5
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 13'036 additional samples on MalwareBazaar
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:yrcy loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Xloader Payload
Xloader
Unpacked files
SH256 hash:
3a073bd18bc0b65e36eb358bbb8d937db10b4e174b4dc9fd7b6cb986878e0d58
MD5 hash:
38e9e35b3559bcada96ba6d1c37e644b
SHA1 hash:
c036d3243ee85b2bbb3e6a98adad620c19592e77
SH256 hash:
65f0bce9dc0a9ac44240513d358c8e469e1a57b50b0f9c7d953f6e00bd6861fa
MD5 hash:
905b1dc3e024e593c76ef625223d4412
SHA1 hash:
1929c9f87e67cd623d28aa4d5f58d7ed2b8a067f
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
959b7ce61e82bc7f837042b10627c2d87442d52a243eafa8b837419ec0174418
MD5 hash:
c8b74e4a2c66f86395db98ddca233936
SHA1 hash:
4abb7f77a640cea2982200a85b50262b6cc98fe3
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.33
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://103.167.92.57/gcould/vbc.exe