MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d67265883ffb3f3129132bfe1dad4a828c887266a0a005e814bcda58c525625b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: d67265883ffb3f3129132bfe1dad4a828c887266a0a005e814bcda58c525625b
SHA3-384 hash: d54689c3b53ef5ac98114461d5c90ab299b8eebaca98f997ddad5cdfe4f15b0c680a51f136510fa19a231a5d1b2e19bb
SHA1 hash: 183346b281577a411c52c9bd9b0fa5ac2bb27a92
MD5 hash: 5be7cc1587991183bd1b8be8fc159138
humanhash: march-nebraska-yellow-whiskey
File name:5be7cc1587991183bd1b8be8fc159138.exe
Download: download sample
Signature Formbook
File size:1'043'968 bytes
First seen:2022-03-23 20:12:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:1twic8fq+WVhVOsih5EeX/kdz5xKLoLyDRXGeY3e:J0+shVnihyeOBWDge+
Threatray 12'967 similar samples on MalwareBazaar
TLSH T1DA2501F8B1D64F91E42D87F05578F86003B231B36DC6DB281EB9A5C45EAAF641E01A4F
File icon (PE):PE icon
dhash icon a888b8bab8b888a8 (3 x Formbook, 2 x AgentTesla, 1 x Loki)
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
210
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
https://websitedesignoxfordshire.co.uk/Cypi0.exe
Verdict:
Malicious activity
Analysis date:
2022-03-24 19:57:42 UTC
Tags:
trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.RealProtectPENGSD
Status:
Malicious
First seen:
2022-03-23 20:13:19 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:uit2 loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Xloader Payload
Xloader
Unpacked files
SH256 hash:
5aadcc2d4fb0a2dff305a635f69432f1878ac3e45a2ff67cd70b18aba257eac4
MD5 hash:
8172995a52b500a7a85e7f3e613b3b72
SHA1 hash:
6681c2b106be022b091d8de8c52940119510b091
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
815c016b26a2aabe6f9238447ca1df25b1edb7e455833ffe625dd365fd57571b
MD5 hash:
cf6fff008c23474563d88c02d75421f4
SHA1 hash:
fcb4a9d160d0c4d451de957ed528da891e8ae4cd
SH256 hash:
5680c529ee9d94d831df983fb4eeeaa8fd7f89902881b57750fd3e0c5e0ee11b
MD5 hash:
3b4b7b8eec5ecca5344fae8319d8c3a5
SHA1 hash:
2748f4b64d51f4c072abaa11301b2767b0e38191
SH256 hash:
8f1e0afa4d70d6ddaf839ecec6f7dbfa05abeac45742cf36927b6190c0e2b83f
MD5 hash:
36204c25a2433f0d5bb71299613b47ec
SHA1 hash:
064ac9dcdb27dd1756118e5d47f360a6f9fdcf9d
SH256 hash:
d67265883ffb3f3129132bfe1dad4a828c887266a0a005e814bcda58c525625b
MD5 hash:
5be7cc1587991183bd1b8be8fc159138
SHA1 hash:
183346b281577a411c52c9bd9b0fa5ac2bb27a92
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe d67265883ffb3f3129132bfe1dad4a828c887266a0a005e814bcda58c525625b

(this sample)

  
Delivery method
Distributed via web download

Comments