MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b76b8c13335413cab914bf9ffc58d5f0c121fc734c61c2083633125dc2210562. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | b76b8c13335413cab914bf9ffc58d5f0c121fc734c61c2083633125dc2210562 |
|---|---|
| SHA3-384 hash: | 5cf3c7aa0b03371da0f9cbf098c15af0d2cb3e729fd655fa8bf949a4ce47271fbbde59f3662e033b00c73459d60d40ab |
| SHA1 hash: | ec377b64bcb783f94dc90d8229fed8d448cf49c1 |
| MD5 hash: | 0fc950d47b8ed0b5bbb31c26c81155a3 |
| humanhash: | yellow-aspen-mexico-solar |
| File name: | SecuriteInfo.com.Trojan.PackedNET.1761.18568.815 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 541'696 bytes |
| First seen: | 2023-01-11 14:38:33 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 12288:nl2wi5FpsIU8hDRfnILP0JXxcIIy2hd2XEYPC6m+8ubkw:n1i5FfU8hDRuP0PcIXW+bkw |
| TLSH | T10AB4E08F58D1B820EFD41574C342A8CC19772F019AF7E89E9C973D2F69205ED2AA518F |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10523/12/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4505/5/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.PackedNET.1761.18568.815
Verdict:
Suspicious activity
Analysis date:
2023-01-11 14:41:48 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Verdict:
No Threat
Threat level:
2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-01-11 14:39:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
21 of 26 (80.77%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:g44n rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
e7242ae1cd799ea3200b7705221fdddd8abf588e87215a28057e02135bf547ad
MD5 hash:
6b1c0c833df93681eafdcf57072e8075
SHA1 hash:
5081196e5fd1e90c7564ce07096baf4668bbc3fc
Detections:
XLoader
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
59bcd4203167ab824809004c0f4030f58acbd7c4f382b6e2d5f0c5695a71e170
MD5 hash:
3820d6b49c5470a173913d3933e38cff
SHA1 hash:
563a66c1ccd79d751de8b717f050300bdbf776db
SH256 hash:
d5718cfc5ded3ac791f539fab3a5559384b2a1694a0dc689f58e98e57bed18aa
MD5 hash:
207f7ee2a146b265261dbb94a29b06a9
SHA1 hash:
c2d0954cd772f6d6e6c020796fe90f3aee4c18bb
SH256 hash:
c8ff0d78fc921526b0addaa85114f31f7a142ff079281538142c95b085828cb5
MD5 hash:
6121b59c68e773beafd68c8191ec0062
SHA1 hash:
ba18e0f0698e308b2e464549ec3a1d90326c61ef
SH256 hash:
231d3ad6e558cd5c0d624f8979181f8aa2a21973828aadcae105523284f9d74a
MD5 hash:
572165371ae288df8eed27e05656ada6
SHA1 hash:
378e6f9511a1b1253eb6a2f1ed081ff801fac90b
SH256 hash:
b37263c6e42f4dfc0b82f296b93b0328e2bb74fa0d27b19ce703b9e557dfe9e9
MD5 hash:
6c95fb55c4b4f32dcdca1e493e2c22d9
SHA1 hash:
0367811fbbd72e60d3abfd6ffc469837c7437c0d
SH256 hash:
b76b8c13335413cab914bf9ffc58d5f0c121fc734c61c2083633125dc2210562
MD5 hash:
0fc950d47b8ed0b5bbb31c26c81155a3
SHA1 hash:
ec377b64bcb783f94dc90d8229fed8d448cf49c1
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.45
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.