MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c6c0c397d2ebb9d9188e91750d7c04c17f59d70025fab943a03c82229549dd53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 18
| SHA256 hash: | c6c0c397d2ebb9d9188e91750d7c04c17f59d70025fab943a03c82229549dd53 |
|---|---|
| SHA3-384 hash: | 615ead1f9f65cda27c2a89aee5eb7b591d1628174034a560e21c3f1d6cb14265e8cbc76fd6fde547badc7632c88fe3f7 |
| SHA1 hash: | d55f2a22974de84de0b19ef3a4e1775d97d856aa |
| MD5 hash: | 1bc627fc0dd5c6a20344c76fd15a2627 |
| humanhash: | asparagus-single-steak-jupiter |
| File name: | Ziraat Bankasi Swift Mesaji.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 245'891 bytes |
| First seen: | 2022-04-08 09:35:20 UTC |
| Last seen: | 2022-04-08 11:10:53 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56a78d55f3f7af51443e58e0ce2fb5f6 (720 x GuLoader, 451 x Formbook, 295 x Loki) |
| ssdeep | 6144:HNeZmhs+wbfFrmE10Xy9/AmgnB/iAdFtzvW/ha:HNlhsTFrmE+XI//gnPxzvf |
| TLSH | T12134121539E8C57BD96205B00ABB9A3797B16215323A878F1730AB56BC313C1EA4FF52 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook geo TUR ZiraatBank |
Intelligence
File Origin
# of uploads :
2
# of downloads :
192
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Ziraat Bankasi Swift Mesaji.exe
Verdict:
Malicious activity
Analysis date:
2022-04-08 21:44:46 UTC
Tags:
formbook trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching a process
Сreating synchronization primitives
Launching cmd.exe command interpreter
Searching for synchronization primitives
Setting browser functions hooks
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
formbook
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-04-07 16:51:18 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
20 of 41 (48.78%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:as31 rat spyware stealer suricata trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
73d2c8a67ddb9058954f848629dac22aa4ea924d053d605c15b9be0f29c27b26
MD5 hash:
6d1a334cab8da33b031a2b3890461a64
SHA1 hash:
535e782651f3371ec5112e615d2518bc5f50cf09
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
13e525a9b8cf60ae406c48dfca9187849ede51689d5dba9d7f09828e74fb827d
MD5 hash:
e0e6a2278431a163ff606b3a0eca60af
SHA1 hash:
d0c9ae217d918ae7028474e29cfacdcc6a399539
SH256 hash:
c6c0c397d2ebb9d9188e91750d7c04c17f59d70025fab943a03c82229549dd53
MD5 hash:
1bc627fc0dd5c6a20344c76fd15a2627
SHA1 hash:
d55f2a22974de84de0b19ef3a4e1775d97d856aa
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.