MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b663fea76aadbf574e5bb9f704ad689ec10f0d720b0b9641e70b27494fe4cc17. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: b663fea76aadbf574e5bb9f704ad689ec10f0d720b0b9641e70b27494fe4cc17
SHA3-384 hash: fbeba4a03829b5c8e983a3c7e76d410aa8cda9cddecfef8ad4e76fc07eb580745b9809d1fe8b859c55841182ed29a734
SHA1 hash: 9a0606c633ffe5ae4b6dcb7dcfba57b7e22cb05d
MD5 hash: 89cfb542cda6a428cc5c02feaf3c55f8
humanhash: oklahoma-alpha-iowa-west
File name:SecuriteInfo.com.Variant.Zusy.394472.15672.20727
Download: download sample
Signature Formbook
File size:198'124 bytes
First seen:2021-07-22 08:47:18 UTC
Last seen:2023-06-08 13:45:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ad7593902351b94d30c5d42690419916 (2 x AgentTesla, 1 x Formbook, 1 x Loki)
ssdeep 3072:p5y2zSw5QFZ5h8gOgXN15tm4Inoll4wegWYXzb+f3iIvwDrqvHDlkNBKrD9CafOn:Dy2OVbFvLKzTwePi+nQrU8+fLBcMQ
Threatray 6'727 similar samples on MalwareBazaar
TLSH T1031412870B9FAB56C261D3B7429CE93BD636A1F3558F422B1715F70B80E11C44616F83
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
9
# of downloads :
103
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Variant.Zusy.394472.15672.20727
Verdict:
Suspicious activity
Analysis date:
2021-07-22 08:50:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.VirRansom
Status:
Malicious
First seen:
2021-07-22 03:41:08 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.yjhlgg.com/grve/
Unpacked files
SH256 hash:
b663fea76aadbf574e5bb9f704ad689ec10f0d720b0b9641e70b27494fe4cc17
MD5 hash:
89cfb542cda6a428cc5c02feaf3c55f8
SHA1 hash:
9a0606c633ffe5ae4b6dcb7dcfba57b7e22cb05d
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments