MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b99ee6d1625f7b0c9685c3bb49173c4425e39fbfe6a1a4eb6faf039b1ecbbfb8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: b99ee6d1625f7b0c9685c3bb49173c4425e39fbfe6a1a4eb6faf039b1ecbbfb8
SHA3-384 hash: c018cae647c3e2fb55255e1c248dc937295dfdbfef96fa8473d891ff13612abe0a1ce89ae5f13bd0fe409af605222b7e
SHA1 hash: 7c46dbc562d79530f7b7306fb18e16d82adf2bef
MD5 hash: f8af29e0634e26ee188e76be7c3f4337
humanhash: harry-fourteen-video-mike
File name:CONTRACT VP-SYM102022 PI 21060008.xll
Download: download sample
Signature Formbook
File size:2'560'512 bytes
First seen:2022-03-01 07:51:09 UTC
Last seen:Never
File type:Excel file xll
MIME type:application/x-dosexec
imphash be710ba34b048ab0098050ccf62e369c (18 x Formbook, 14 x Dridex, 9 x AgentTesla)
ssdeep 49152:RmqGi7RLLaFKXGRoKCpUBRAsBqJoYXFh1A/XYd:UqGi7VWRGkRPBqhF7A/
Threatray 63 similar samples on MalwareBazaar
TLSH T167C51256BEC56EB5DFBF42B74361E62D1225736E03A196CF7603049D3A61EC2843EA03
Reporter abuse_ch
Tags:FormBook xll

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
Office Add-Ins - Suspicious
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-02-28 10:54:31 UTC
File Type:
PE (Dll)
Extracted files:
2
AV detection:
16 of 27 (59.26%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:okup loader rat
Behaviour
Checks processor information in registry
Enumerates system info in registry
Gathers network information
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Xloader Payload
Xloader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments