MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d8f888158556fe3971ae3904db9268b95c1d7f3ee1991dbd04002e018b65750f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | d8f888158556fe3971ae3904db9268b95c1d7f3ee1991dbd04002e018b65750f |
|---|---|
| SHA3-384 hash: | bd8c58cde504897fc0dd594db59aed69efec84603cbf291f3bc749cff3ba60f65b2a90fd939919023d431d071110c8c4 |
| SHA1 hash: | ae079d5e44e8b797dd8c29a9f9fd13d9466bc97a |
| MD5 hash: | 9572e695a50ea24517e2414010e10b46 |
| humanhash: | oven-lion-table-salami |
| File name: | 9572e695a50ea24517e2414010e10b46.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 340'590 bytes |
| First seen: | 2022-02-24 18:09:19 UTC |
| Last seen: | 2022-02-24 19:53:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla) |
| ssdeep | 6144:TxD7+ihfubpqe6ZFBwZlt26euWhXlUCU0Ch5dlGBkV8Vd1vBIZLlGs7:4guA1ZFBilIpuKChNV8Vd1MLo+ |
| TLSH | T1827423B937C5885BF61911B2C8B2DB72EAF2F3002672651F9B485FFE4C2B2469F41065 |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
DNS request
Sending an HTTP GET request
Searching for synchronization primitives
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
xloader
Threat name:
Win32.Trojan.NSISInject
Status:
Malicious
First seen:
2022-02-24 11:30:09 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
22 of 28 (78.57%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:yrcy loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Xloader Payload
Xloader
Unpacked files
SH256 hash:
65f0bce9dc0a9ac44240513d358c8e469e1a57b50b0f9c7d953f6e00bd6861fa
MD5 hash:
905b1dc3e024e593c76ef625223d4412
SHA1 hash:
1929c9f87e67cd623d28aa4d5f58d7ed2b8a067f
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
0013c266aef2611a034268e74cf293cf443b9246ef569c9acf6fadab59a45341
MD5 hash:
09bbca18da135482d44b23c70f9d8568
SHA1 hash:
9edfd59b24069657a2cf6eb35cfe5bed6e3d1fe7
SH256 hash:
d8f888158556fe3971ae3904db9268b95c1d7f3ee1991dbd04002e018b65750f
MD5 hash:
9572e695a50ea24517e2414010e10b46
SHA1 hash:
ae079d5e44e8b797dd8c29a9f9fd13d9466bc97a
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.18
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.