MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c99f75aa4a30b9395de37da19c6062b6fde59121e314eaf1e48613a6af2ed0e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: c99f75aa4a30b9395de37da19c6062b6fde59121e314eaf1e48613a6af2ed0e0
SHA3-384 hash: 78779649d0c44cf575c476ae3133bbbbeab224cd2f4a3b963a7c338da050aff9c1c011f4082d9183c948e3d0ad08902a
SHA1 hash: f91e810a5b72ba7c4b5c26f98ded2247504ee26d
MD5 hash: efe0050c2df3b09512e4003d5c3cf78f
humanhash: kitten-florida-fillet-iowa
File name:COMMECIAL INVOICE 260122pdf.exe
Download: download sample
Signature Formbook
File size:457'728 bytes
First seen:2022-02-09 10:19:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:8VO7JROAwvFjqgask2Ww2tsJYutqUUPLHhni:8VOVUYgaftvFUUPVi
TLSH T1C6A4AEB4A1A78591F10BC974267CF96502B235E3A9C60D391B793641CBEEF983F8460F
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
177
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-02-02 22:57:52 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
29 of 43 (67.44%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:n8bs loader rat
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Xloader Payload
Xloader
Unpacked files
SH256 hash:
dd868f6769608967d3615244d33f6e8f88503caa101351338fe9e2f6df080b49
MD5 hash:
0c2beadcf112154928bd1073c4215742
SHA1 hash:
8f0006164b2acdfd43b5d65361d2f1be79c86fd6
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
6f1b89bc3013177c101fe4448340c48c0dd08d19017a798bd11c2d0f76be1fbc
MD5 hash:
60a604887b3616e3ed86d81fab0a9ebb
SHA1 hash:
8db84f5f4c569c86c69aff464b2ffc4ce3dafa20
SH256 hash:
751e9a866b801aacc76409b2e441e4bc5c6085b08bbff6588fe1de8ee81d273d
MD5 hash:
479bc9d41981ba14172207d2a7c21263
SHA1 hash:
5baf9fc214c71cca9d3f804941dec987a7b7d67a
SH256 hash:
c99f75aa4a30b9395de37da19c6062b6fde59121e314eaf1e48613a6af2ed0e0
MD5 hash:
efe0050c2df3b09512e4003d5c3cf78f
SHA1 hash:
f91e810a5b72ba7c4b5c26f98ded2247504ee26d
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_Formbook_strings
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe c99f75aa4a30b9395de37da19c6062b6fde59121e314eaf1e48613a6af2ed0e0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments