MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb51f3c16fbd5864ed8b436c89600948cdc76e2c0bf84aca221992f405a77eb9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: cb51f3c16fbd5864ed8b436c89600948cdc76e2c0bf84aca221992f405a77eb9
SHA3-384 hash: ce9b32d3a31ee1e6c06603279362b5925e45cd6fef044eacd851563a00427dea38047cdc4dabd3c79d37283674bafabb
SHA1 hash: d36634b9ad1fb1ae9f851005572702cad96823af
MD5 hash: 97221305ce5f05743f46f1998db359ba
humanhash: fish-triple-eight-east
File name:dddddsdsdssds.exe
Download: download sample
Signature Formbook
File size:253'440 bytes
First seen:2022-01-18 15:39:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:R7W0gEFovhf3vz3evqLMOUI5x9oWCoMqPoJ8L:R7BvY3ruvq4xI5x9BCsP
Threatray 12'725 similar samples on MalwareBazaar
TLSH T170440202D1C30297F52A06B3B5939BC3AFB4914D5DD18B4AA8DC316D0D9F68AB847ECD
File icon (PE):PE icon
dhash icon 550959654d651945 (37 x Formbook, 28 x AgentTesla, 14 x RemcosRAT)
Reporter Anonymous
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dddddsdsdssds.exe
Verdict:
Malicious activity
Analysis date:
2022-01-19 02:24:43 UTC
Tags:
trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a file
Сreating synchronization primitives
DNS request
Launching cmd.exe command interpreter
Sending an HTTP GET request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed replace.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 555030 Sample: dddddsdsdssds.exe Startdate: 18/01/2022 Architecture: WINDOWS Score: 100 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 50 4 other signatures 2->50 10 dddddsdsdssds.exe 1 2->10         started        14 explorer.exe 2->14         started        process3 file4 32 C:\Users\user\...\dddddsdsdssds.exe.log, ASCII 10->32 dropped 60 Detected unpacking (overwrites its own PE header) 10->60 62 Writes to foreign memory regions 10->62 64 Allocates memory in foreign processes 10->64 66 Injects a PE file into a foreign processes 10->66 16 CasPol.exe 10->16         started        signatures5 process6 signatures7 36 Modifies the context of a thread in another process (thread injection) 16->36 38 Maps a DLL or memory area into another process 16->38 40 Sample uses process hollowing technique 16->40 42 2 other signatures 16->42 19 explorer.exe 16->19 injected process8 signatures9 52 Uses netsh to modify the Windows network and firewall settings 19->52 22 netsh.exe 19->22         started        process10 signatures11 54 Modifies the context of a thread in another process (thread injection) 22->54 56 Maps a DLL or memory area into another process 22->56 58 Tries to detect virtualization through RDTSC time measurements 22->58 25 explorer.exe 2 154 22->25         started        28 cmd.exe 1 22->28         started        process12 dnsIp13 34 192.168.2.1 unknown unknown 25->34 30 conhost.exe 28->30         started        process14
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2022-01-18 15:40:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:be4o loader rat suricata
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
8448cb26bbc12696f55012c7eb202518408cd0b4d7782aa3ef5bd25b0a5a6e86
MD5 hash:
06e0b802ddfced9bd00661c179e55f55
SHA1 hash:
14a90bca64fb347856c1f1f68bc77bb87d22852b
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
25087793f228437ffc9eeb4100de8ed5d2a65546a5b952b900856b80e2f1c81c
MD5 hash:
4bf2f49f3f4d28cc46e90e203030130b
SHA1 hash:
c07b611b1b6d3b6b1b8e04d57b1f2bf643f42ead
SH256 hash:
22113aa70b4ae3e4c8e37c8d0b3a70fc7f685dbca370d43d4a463bf209b0b41d
MD5 hash:
4f4ef3d24b9ac18dd304708f07708c3d
SHA1 hash:
13d33623691a8a415672f1a889ec5e2649298421
SH256 hash:
cb51f3c16fbd5864ed8b436c89600948cdc76e2c0bf84aca221992f405a77eb9
MD5 hash:
97221305ce5f05743f46f1998db359ba
SHA1 hash:
d36634b9ad1fb1ae9f851005572702cad96823af
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe cb51f3c16fbd5864ed8b436c89600948cdc76e2c0bf84aca221992f405a77eb9

(this sample)

  
Delivery method
Distributed via web download

Comments