MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ba989ee01ad39b78f47142e56183f0946d74ded34ad136a48576a5a9aff25c34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 9
| SHA256 hash: | ba989ee01ad39b78f47142e56183f0946d74ded34ad136a48576a5a9aff25c34 |
|---|---|
| SHA3-384 hash: | 63ba6d5e131de03846c1934b1b4a32a15efb26c97113d39bfa67b8e58ebe97daee894b5535468095313048292cb3dd8a |
| SHA1 hash: | 94f02eaeac3c6552910ff5983a43eedb2822d63d |
| MD5 hash: | dc2ddfdc1beb443beec66d168ed29422 |
| humanhash: | lamp-one-butter-skylark |
| File name: | Haesung-tech-drawing-견적요청_해성190918.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 828'416 bytes |
| First seen: | 2020-11-19 06:42:52 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f19034443dbba8ae65cae64d05fef57a (13 x Loki, 3 x Formbook, 2 x AgentTesla) |
| ssdeep | 12288:IbkNnMdUO4rvcMZKwangiFPWY/mnM44ZVA0hjQY0DxAB+ZfN:B6j4rvrKwang6WCxVA0dCA8ZfN |
| Threatray | 2'972 similar samples on MalwareBazaar |
| TLSH | 70058EAFA1A0483FC123163ADC1B5FA85936BE10F92869462BF41D4C5F396D178172BF |
| Reporter | |
| Tags: | exe FormBook geo KOR |
abuse_ch
Malspam distributing unidentified malware:HELO: ns.asakurasoft9.jp
Sending IP: 211.1.230.21
From: Haesung Tech Co., Ltd <giga-tech@daum.net>
Reply-To: giga-tech@daum.net
Subject: 조언: Request for quotation _ Haesung Tech
Attachment: Haesung-tech-drawing-견적요청_해성190918.img (contains "Haesung-tech-drawing-견적요청_해성190918.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
Launching cmd.exe command interpreter
DNS request
Sending an HTTP GET request
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2020-11-19 04:30:12 UTC
AV detection:
17 of 48 (35.42%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
netwirerc
Similar samples:
+ 2'962 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.sunflowersbikini.com/o1u9/
Unpacked files
SH256 hash:
ba989ee01ad39b78f47142e56183f0946d74ded34ad136a48576a5a9aff25c34
MD5 hash:
dc2ddfdc1beb443beec66d168ed29422
SHA1 hash:
94f02eaeac3c6552910ff5983a43eedb2822d63d
SH256 hash:
a9094729830fcc5a5071904f48fcd3a804f02aef6782350b152d7650d38acc9f
MD5 hash:
09a722a8fc69e9097682425df7930673
SHA1 hash:
8a1a5492f2d8afa3efb788682895cf7f9d2f6f61
SH256 hash:
63f19caf7c1b22ec4856b64cbfad0368755d7d917c5df022566b1b1f458a48f1
MD5 hash:
0a1360928d9421ecee80cc918fa7b9c3
SHA1 hash:
1ff361e0b52e323a16040767a1730eddfd8420b3
Detections:
win_formbook_g0
win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.