MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 da99d68a728c3a14d186c03c30b551914fe57073f231d334be7955131cb5f921. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 12
| SHA256 hash: | da99d68a728c3a14d186c03c30b551914fe57073f231d334be7955131cb5f921 |
|---|---|
| SHA3-384 hash: | 692bc8c9570717a36807c2a8c6268282fcdb063de71c1dce0a730bc35bfdf27b0c38b2e70a11b75a4fae55f52513f09b |
| SHA1 hash: | fd2833f0eea85cccc795ffe375d1503a0df739bf |
| MD5 hash: | 550160d122f85c9502a7a8e219dc68f3 |
| humanhash: | south-video-mississippi-virginia |
| File name: | 550160d122f85c9502a7a8e219dc68f3 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 469'011 bytes |
| First seen: | 2022-01-20 20:50:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 099c0646ea7282d232219f8807883be0 (476 x Formbook, 210 x Loki, 107 x AgentTesla) |
| ssdeep | 6144:fwhxy7FtFjJHQlXBi3Xl9QZvXtaBh/ZKeTsJfGHZzp31:6gFBMi3f8vdSRKe0eZF31 |
| Threatray | 13'249 similar samples on MalwareBazaar |
| TLSH | T1B0A4BFC3142C54DBF96F5573E46355EBB8F03126A38520ABB56BE6F2200162A871FB3D |
| File icon (PE): | |
| dhash icon | feeccc8c1c06060d (2 x Formbook) |
| Reporter | |
| Tags: | 32 exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Formbook
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
xloader
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-01-20 20:51:11 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
22 of 28 (78.57%)
Threat level:
5/5
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 13'239 additional samples on MalwareBazaar
Result
Malware family:
xloader
Score:
10/10
Tags:
family:xloader campaign:nt3f loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Xloader Payload
Xloader
Unpacked files
SH256 hash:
c5ba669697ae91226ac5792c63335ca8c7c33ee0d1431dc4b21c7d27b8a105a3
MD5 hash:
0949bcc657e010888cdc627c08896169
SHA1 hash:
fb81029a2b6e8707fb5d6459c8e783c15c1a091f
SH256 hash:
149fddd6d60737e0e971c03111a4bb582ca16a8f08c838e73371163191cd17d5
MD5 hash:
40056abcdc0a75b7b51b5c08b8db3c07
SHA1 hash:
05eed606a5cd55f7c72de355fd1f7ba753c9ade4
Detections:
win_formbook_g0
win_formbook_auto
Parent samples :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 hash:
da99d68a728c3a14d186c03c30b551914fe57073f231d334be7955131cb5f921
MD5 hash:
550160d122f85c9502a7a8e219dc68f3
SHA1 hash:
fd2833f0eea85cccc795ffe375d1503a0df739bf
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.33
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://147.124.209.103/222/vbc.exe