MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab12ca2a034e07fbdd6c9d6c31270f52173cd8559e12aad0aea593cc460867cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: ab12ca2a034e07fbdd6c9d6c31270f52173cd8559e12aad0aea593cc460867cd
SHA3-384 hash: 2dfea8f0d5b51205437150750af300a7c4ccf8b9c9943346844cf090dd932f76e9467bdb5c7dcf48d24bda5f9a71a266
SHA1 hash: 2119989b539ebe1cfcdac7a1d20672e7bf8f4415
MD5 hash: 448027ac61130d2e4d6db71e3bfbc888
humanhash: uranus-asparagus-friend-pizza
File name:ARCO Purchase Requisition NO. REQ-05426.xll
Download: download sample
Signature Formbook
File size:4'608 bytes
First seen:2022-02-22 08:07:35 UTC
Last seen:Never
File type:Excel file xll
MIME type:application/x-dosexec
ssdeep 48:Zvt1FVUT7IzKFG35odeKWd2zPmCY458tpj9/vey+WreTdm0lgKoJgUQ2:Z1FQ7eoeKZz+sopjhve6rvEBoJ7Z
Threatray 13'701 similar samples on MalwareBazaar
TLSH T10C912907E2FCB0A3C0AA9A74118D0191EEC2D8707B7B5FC70EC596177AA69626D20FC5
Reporter abuse_ch
Tags:FormBook xll

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win64.Trojan.Tnega
Status:
Malicious
First seen:
2022-02-21 15:30:37 UTC
File Type:
PE+ (Dll)
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:g5ef loader rat
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Drops file in Windows directory
Suspicious use of SetThreadContext
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Xloader Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Xloader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments