MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a8d72d9791e3080312eeff69c3bda4301366780ad500701ffebaecde83cc2ed1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: a8d72d9791e3080312eeff69c3bda4301366780ad500701ffebaecde83cc2ed1
SHA3-384 hash: 51aeb97833e1d2b18c9a4034c2c79949571cd2d6177ee8b99d19cf33af2be30a0810bd786455a3390bdf725537760e59
SHA1 hash: c7a813766f1f3cf47cf5ffdb22752bdd1c3153f0
MD5 hash: c60caec54c1f969cb7ebb6b4717f9d95
humanhash: romeo-magnesium-rugby-single
File name:RFQ# 210362.exe
Download: download sample
Signature Formbook
File size:424'381 bytes
First seen:2022-03-31 13:48:23 UTC
Last seen:2022-03-31 15:06:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a78d55f3f7af51443e58e0ce2fb5f6 (720 x GuLoader, 451 x Formbook, 295 x Loki)
ssdeep 6144:cNeZpf+qTwza339izUARXvDfKi4V+T72ZDJgxsYtCDeo008:cNKZ8zUAZDD4V0UVgx5
Threatray 14'682 similar samples on MalwareBazaar
TLSH T1E794DF2271D08096D4294631A8BAF87E2D435E6918F1F49FA380FF5DDA35946FC2E732
File icon (PE):PE icon
dhash icon 54d4d4d4d454d4a8 (1 x Formbook)
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Searching for synchronization primitives
DNS request
Sending an HTTP GET request
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe overlay packed python shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Nsisx
Status:
Malicious
First seen:
2022-03-31 13:47:47 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
19 of 42 (45.24%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:n8di loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
Xloader Payload
Xloader
Unpacked files
SH256 hash:
252a8e5ba8c4ba34bf5668e3de4642f6142885c3b35226aadcf7b2905616aeff
MD5 hash:
8fd950a48424898d10dacbbbd57e6376
SHA1 hash:
0b2909e4386d01181e14a47f41b843a4f0da58b1
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
b652d5baa22790eea3e1d30c789a4183c1d3c9092a4dcaddb6009e1a37e7e6a2
MD5 hash:
060e6751f812268fc05ef2fb172eff71
SHA1 hash:
081ddfd8a1975dec0faf9f007429f28cc891c703
SH256 hash:
7ee3a8dccacc65c285d7dd46cf616c02480d763c0529a3b914c215dd853e4c4d
MD5 hash:
858ba7b059863c5fd4799c402677639d
SHA1 hash:
4754f016f1fedb3cc646d4df2ce45d89680ec761
SH256 hash:
a8d72d9791e3080312eeff69c3bda4301366780ad500701ffebaecde83cc2ed1
MD5 hash:
c60caec54c1f969cb7ebb6b4717f9d95
SHA1 hash:
c7a813766f1f3cf47cf5ffdb22752bdd1c3153f0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments