MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b3bc74c1f3673da08a95775af5f39dd116a249d8a7e597fcd8bb56e07ae3bcd2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 10
| SHA256 hash: | b3bc74c1f3673da08a95775af5f39dd116a249d8a7e597fcd8bb56e07ae3bcd2 |
|---|---|
| SHA3-384 hash: | 18342b389df690b5a35e029acc98441e6655ecd2ad9a7443f8264d6412a8d54c4346bbcc4f8986f24df64e652b790d5b |
| SHA1 hash: | c899b3177bdf5811a1aa507a13d49fea6ba3dc40 |
| MD5 hash: | 34df0e4d3d5863b1a86489be85a045aa |
| humanhash: | princess-leopard-aspen-carpet |
| File name: | 34df0e4d3d5863b1a86489be85a045aa |
| Download: | download sample |
| Signature | Formbook |
| File size: | 702'464 bytes |
| First seen: | 2021-10-22 09:27:10 UTC |
| Last seen: | 2021-10-22 13:18:52 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7c956dad9ea202d643355dc7895aa9c5 (2 x Formbook, 1 x RemcosRAT, 1 x NetWire) |
| ssdeep | 12288:EdO8lwYc+Plun+IBTid8obF+OCefbtaKuRmDI:EUOTPlun+zdRaYbOF |
| Threatray | 10'795 similar samples on MalwareBazaar |
| TLSH | T153E47E12B9E38036E531273F9E5E2A2C240FBD756F3976422BDCBD449F7A28211526C7 |
| File icon (PE): | |
| dhash icon | 252504594c963160 (2 x Formbook, 1 x RemcosRAT, 1 x NetWire) |
| Reporter | |
| Tags: | 32 exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
DBatLoader FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Execution from Suspicious Folder
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2021-10-22 09:27:42 UTC
AV detection:
11 of 44 (25.00%)
Threat level:
5/5
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 10'785 additional samples on MalwareBazaar
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:mwev loader persistence rat
Behaviour
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Blocklisted process makes network request
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.scion-go-getter.com/mwev/
Unpacked files
SH256 hash:
651d2f39c341c86341babbf45e367c1fe183f49348f3816f91920e08ed057d2a
MD5 hash:
100b966ad7ecd1ba763f069d4f1c27d6
SHA1 hash:
630ce76fda48fa229e41cf3e5b70f21af8288af0
Detections:
win_temple_loader_w0
Parent samples :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 hash:
09fadc4eab093c395449a646a9bbb8fd3f838bccb4774534b506b8b4be62b86e
MD5 hash:
353ad36a34647f91fa40a89e69f72dbb
SHA1 hash:
eb2c92ca5a58b28825280ed5873e8e559550f4cf
SH256 hash:
b3bc74c1f3673da08a95775af5f39dd116a249d8a7e597fcd8bb56e07ae3bcd2
MD5 hash:
34df0e4d3d5863b1a86489be85a045aa
SHA1 hash:
c899b3177bdf5811a1aa507a13d49fea6ba3dc40
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://198.46.199.161/0007/vbc.exe