MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9de751536a55984df4e0686ff47bbe5553906d4b2e2559d7afc019fcb7d4eb4a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 9de751536a55984df4e0686ff47bbe5553906d4b2e2559d7afc019fcb7d4eb4a
SHA3-384 hash: 4881bce519ce2c7cab1a8c7316a81d9d163800884bac92ecca9ed5f3107855fc389272c8a654edb35e8220f223c48891
SHA1 hash: 6563f1ac1ed459403a63b3d78a55c94a1b939d04
MD5 hash: bc95dfb1bbe14031b0ee4318dc731457
humanhash: montana-lemon-hydrogen-fix
File name:triage_dropped_file
Download: download sample
Signature Formbook
File size:255'042 bytes
First seen:2022-01-31 21:33:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 099c0646ea7282d232219f8807883be0 (476 x Formbook, 210 x Loki, 107 x AgentTesla)
ssdeep 6144:owZope7DHMykBw45ldcRBfQnTpHItV50sUcd3h3r8xr11x:lopcrMoW7U1OCtDNrRb211x
Threatray 13'203 similar samples on MalwareBazaar
TLSH T17C4412A601C0A9BBE458EA736E37E77AEBFB76081F5101134F454EDE760E091089B1D7
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter malwarelabnet
Tags:exe FormBook xloader

Intelligence


File Origin
# of uploads :
1
# of downloads :
192
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
saskaita apmoketa.xlsx
Verdict:
Malicious activity
Analysis date:
2022-01-31 17:54:38 UTC
Tags:
exploit CVE-2017-11882 loader trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
Сreating synchronization primitives
DNS request
Launching a process
Launching cmd.exe command interpreter
Searching for synchronization primitives
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Spyware.Obfusinjector
Status:
Malicious
First seen:
2022-01-31 21:34:09 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 28 (82.14%)
Threat level:
  2/5
Unpacked files
SH256 hash:
9de751536a55984df4e0686ff47bbe5553906d4b2e2559d7afc019fcb7d4eb4a
MD5 hash:
bc95dfb1bbe14031b0ee4318dc731457
SHA1 hash:
6563f1ac1ed459403a63b3d78a55c94a1b939d04
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments