MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b1a9315bbe1d7fed90a33a02d205fa96993061c7fb391ec408180f2381db9318. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: b1a9315bbe1d7fed90a33a02d205fa96993061c7fb391ec408180f2381db9318
SHA3-384 hash: 3994660b031e3d9375af0f9602aacd8aa737be5430f710955fb0354c986fd89952a0fee9bf1c12d272709270a33c45ef
SHA1 hash: 919d080fb5cb10de8a1c99d12fd605f1a4b0c038
MD5 hash: f820ecf6752d4fe2d39347dfbff8db18
humanhash: fifteen-pizza-blossom-victor
File name:SKM_BL_C224e2104221317034443434434342244347.exe
Download: download sample
Signature Formbook
File size:286'198 bytes
First seen:2021-10-28 08:01:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger)
ssdeep 6144:wBlL/cuiQSeQ6LouFKiINBDiCtvQsf5Zs9sTyucHm88tR+7s:CeuzanuABDpVQsf5WHqtR+4
Threatray 11'069 similar samples on MalwareBazaar
TLSH T1B6541324A2D39823E94257F04EF69F6486A7C318473C7FC717504F1A6E7D1CAA463AA3
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter cocaman
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sigma detected: Suspicious Svchost Process
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nsisx
Status:
Malicious
First seen:
2021-10-28 02:55:22 UTC
AV detection:
15 of 44 (34.09%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:yrcy loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.drmichaelirvine.com/yrcy/
Unpacked files
SH256 hash:
b1a9315bbe1d7fed90a33a02d205fa96993061c7fb391ec408180f2381db9318
MD5 hash:
f820ecf6752d4fe2d39347dfbff8db18
SHA1 hash:
919d080fb5cb10de8a1c99d12fd605f1a4b0c038
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe b1a9315bbe1d7fed90a33a02d205fa96993061c7fb391ec408180f2381db9318

(this sample)

Comments