MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0c5cf38270aad92b5a686dcb145d2baf71a7c4dcef6b853ba3e52e9b349f4e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: b0c5cf38270aad92b5a686dcb145d2baf71a7c4dcef6b853ba3e52e9b349f4e5
SHA3-384 hash: 6eb51d6fcfcd2ed7fbde55259f13f70f05c3d4dcfb98646a11f92fcf3e82b7e56934dd1e86212fd501d6c08d82eaf916
SHA1 hash: 2f9e5712b94e5fee79f93575a7fb651d062a0938
MD5 hash: 0e77117506e45cb650b1363ba40c1e55
humanhash: mockingbird-stream-avocado-steak
File name:0e77117506e45cb650b1363ba40c1e55.exe
Download: download sample
Signature Formbook
File size:954'368 bytes
First seen:2021-06-22 14:38:10 UTC
Last seen:2021-06-22 16:01:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:JH/WFHmmuSMPQipP5dLutFuXIIPur6V5ignvsWzCSHf25ij:2HVRipYfDr6V5ignvsC7+i
Threatray 5'938 similar samples on MalwareBazaar
TLSH F415A0124ECF422EE2758EB557B0BC47C2B66DA62A05B2213EC032EDC5375DADCEE511
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0e77117506e45cb650b1363ba40c1e55.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-22 14:43:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 438459 Sample: heoN5wnP2d.exe Startdate: 22/06/2021 Architecture: WINDOWS Score: 100 31 www.m678.xyz 2->31 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 7 other signatures 2->55 9 heoN5wnP2d.exe 3 2->9         started        13 explorer.exe 2->13         started        signatures3 process4 dnsIp5 29 C:\Users\user\AppData\...\heoN5wnP2d.exe.log, ASCII 9->29 dropped 57 Tries to detect virtualization through RDTSC time measurements 9->57 16 heoN5wnP2d.exe 9->16         started        19 heoN5wnP2d.exe 9->19         started        21 heoN5wnP2d.exe 9->21         started        33 www.cmannouncements.com 74.220.199.8, 49748, 80 UNIFIEDLAYER-AS-1US United States 13->33 35 www.ruhexuangou.com 23.82.57.32, 49736, 80 LEASEWEB-USA-SFO-12US United States 13->35 37 15 other IPs or domains 13->37 59 System process connects to network (likely due to code injection or exploit) 13->59 61 Uses ipconfig to lookup or modify the Windows network settings 13->61 23 ipconfig.exe 13->23         started        file6 signatures7 process8 signatures9 39 Modifies the context of a thread in another process (thread injection) 16->39 41 Maps a DLL or memory area into another process 16->41 43 Sample uses process hollowing technique 16->43 45 Queues an APC in another process (thread injection) 16->45 47 Tries to detect virtualization through RDTSC time measurements 23->47 25 cmd.exe 1 23->25         started        process10 process11 27 conhost.exe 25->27         started       
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-06-22 04:39:40 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.adultpeace.com/p2io/
Unpacked files
SH256 hash:
4616a9f45edafce801bf4cc60bf28ab6001cf94b81d9607a2e0a34e3f648f8db
MD5 hash:
4b672b6d5cbfc6486d0ac8f8af4481b9
SHA1 hash:
38b775d53204c7e63d67b83add3b95f193e796b3
Detections:
win_formbook_g0 win_formbook_auto
Parent samples :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 hash:
bbfdce36b5964f1da43040bc2833b9a878689c9c1e60b917e765032fdf766f6f
MD5 hash:
7835392176adf9055b6bc6977735662d
SHA1 hash:
ce57ce5db835d2e02dadebc4cf98f2776601ff4a
SH256 hash:
32339065ae9538219b4a3217384eec62fc18783291f7d3a7c7935b919241ca44
MD5 hash:
e6243c268bd8f72f1e6025754d678eae
SHA1 hash:
0b7cfb599f10fac104b85f2a1c0225242018d319
SH256 hash:
b0c5cf38270aad92b5a686dcb145d2baf71a7c4dcef6b853ba3e52e9b349f4e5
MD5 hash:
0e77117506e45cb650b1363ba40c1e55
SHA1 hash:
2f9e5712b94e5fee79f93575a7fb651d062a0938
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe b0c5cf38270aad92b5a686dcb145d2baf71a7c4dcef6b853ba3e52e9b349f4e5

(this sample)

  
Delivery method
Distributed via web download

Comments