MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca9d13706dad307a2021d1fa1683e46b5b9670b92ad0ee5e474cbea0620d6299. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments 1

SHA256 hash: ca9d13706dad307a2021d1fa1683e46b5b9670b92ad0ee5e474cbea0620d6299
SHA3-384 hash: ef56002ceaa88911111a10f4e84f646ac0573961f88af308e1896ce1abf135c51cfb11d155defd752d4ad9e9b84ccc38
SHA1 hash: 4958e9f636a2c75aa9f6ad46ad12a4a36513e482
MD5 hash: e2e2b1bd1df8d460c9b1d11097429d16
humanhash: sad-december-foxtrot-maine
File name:e2e2b1bd1df8d460c9b1d11097429d16
Download: download sample
Signature Formbook
File size:308'224 bytes
First seen:2021-09-03 09:02:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a5f1519af792c7c894446b2b7f883ca8 (2 x Stop, 1 x CryptBot, 1 x Smoke Loader)
ssdeep 6144:qBIRwnGF/wPiDHwUT5ssghL4lvNqRzeCIj6l6+ky+NjKyOS/2qV4:DNwPiDHN57ghLuvMUj6Y+khhKfS/R4
Threatray 7'736 similar samples on MalwareBazaar
TLSH T1EC64BE30BBA1C035F5B712F465B687BCA42A7A701B3050CBA2D52AEE16347E4DD3179B
dhash icon e8e8e8e8aa66a499 (51 x RaccoonStealer, 27 x ArkeiStealer, 22 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
07480bba-fa44-48a3-2fa4-08d96ea0b1e6f6bb9f24-a9ee-566e-562d-a9a852cf498f_1630649167.eml
Verdict:
Malicious activity
Analysis date:
2021-09-03 06:46:37 UTC
Tags:
encrypted exploit CVE-2017-11882 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj
Score:
96 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-09-03 03:14:22 UTC
AV detection:
18 of 43 (41.86%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:imi7 loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Xloader Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Xloader
Malware Config
C2 Extraction:
http://www.southerngiggle.com/imi7/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe ca9d13706dad307a2021d1fa1683e46b5b9670b92ad0ee5e474cbea0620d6299

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-03 09:02:22 UTC

url : hxxp://103.133.106.199/ibm/vbc.exe