MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d5881bb367b8481bd0c089d687456d98073f61f47dd28f23fb70ca75cf888bd4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | d5881bb367b8481bd0c089d687456d98073f61f47dd28f23fb70ca75cf888bd4 |
|---|---|
| SHA3-384 hash: | 5d81391c084f06df2b4a377062e4ee8d37b04afa8cb512420477ae6c365686a136eb2132667b627d3a1f4f671a0588d6 |
| SHA1 hash: | 60af1e179ad54ae2d282a9eb1c1d34c6b903cf1d |
| MD5 hash: | f077069761f78fe37da943a779a5b644 |
| humanhash: | lima-leopard-pennsylvania-connecticut |
| File name: | SecuriteInfo.com.Win32.PWSX-gen.19939 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 804'352 bytes |
| First seen: | 2022-09-22 05:07:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:uufqk/C6kaMGcEU3hwB2a3DwzVa7H6Ga3ScoX2oxbbd:Bqka6B1cv6BLM7GpcoX2o |
| TLSH | T19D05CF261AEA4F0BD12563F891D0C2B6A3FADD15E422C2979ECA6CDFF046F548760713 |
| TrID | 64.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.5% (.SCR) Windows screen saver (13101/52/3) 9.2% (.EXE) Win64 Executable (generic) (10523/12/4) 5.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.9% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | f0ccb2f0e8f0ccf0 (12 x Formbook, 8 x AgentTesla, 8 x SnakeKeylogger) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
285
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.PWSX-gen.19939
Verdict:
Suspicious activity
Analysis date:
2022-09-22 05:10:33 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
5/10
Confidence:
67%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
formbook
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-09-22 03:01:52 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
13 of 26 (50.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:k056 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
6ff4bf0414e5586713172d5bf2c5950bc340d4e7e5281c808238ad4854eb4fa5
MD5 hash:
649c8087ff6984851e56db65bd3cc3aa
SHA1 hash:
8aa2a8b9fd0a6607c816095f01743173f6aadb41
Detections:
XLoader
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
60ab46b076aefb25222f508bc0719505b3bae155643353812a81b3a385fdac4a
MD5 hash:
ffe83270ac2f2370a8d612502de38c7f
SHA1 hash:
8f427be7b076ef6010d6471f6956baae3a84a017
SH256 hash:
8d0d3000374bcd5e91c82269fb7a61b9a5e6d987890048459955963ecc8d8e20
MD5 hash:
e2f701507d20149cab3fde224af279d9
SHA1 hash:
80aadd5ca5d8d3e288f9616bd56e7b191c757d30
SH256 hash:
2470b39032f6182252039c88199016566b0de30c6aa02163a143427afedd12af
MD5 hash:
c3a1924684ca30ed22234ce1d9111dfc
SHA1 hash:
7347706241422758c06440fd6044ae4e042b456b
SH256 hash:
e20ec8f3c957bcb6a194ef688bae8af2015cfffb20e7baf8b2114d7b70ade4ee
MD5 hash:
35cb29046968faca7f3f3b4463449b6c
SHA1 hash:
088c8c30ec1bece0a4b5bbfe3982b073f8b95598
SH256 hash:
d5881bb367b8481bd0c089d687456d98073f61f47dd28f23fb70ca75cf888bd4
MD5 hash:
f077069761f78fe37da943a779a5b644
SHA1 hash:
60af1e179ad54ae2d282a9eb1c1d34c6b903cf1d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.65
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.