MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dbd108633606663ffe38920ce2c74dee5e68fd23f510e644cfd358271099942c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: dbd108633606663ffe38920ce2c74dee5e68fd23f510e644cfd358271099942c
SHA3-384 hash: a3cc58bb31e5682731b8af40f92f7326e6bec9e6306b74ec42a258f20b1f6363073ba3cd946ff930077ce256e6913691
SHA1 hash: b1e644ab4e2c4b0f6c63837632196110d0f61897
MD5 hash: 3e400b3ef10d9805b1fb22cee2d474c2
humanhash: arizona-thirteen-pip-gee
File name:SecuriteInfo.com.Trojan.Win32.Save.a.27031.17265
Download: download sample
Signature Formbook
File size:973'312 bytes
First seen:2021-07-16 23:42:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'207 x SnakeKeylogger)
ssdeep 12288:7BnyPxZ0EG3KQyTs4XlhyI/vbUlGyQ1CKEUDyINcbngwnQL2VkRCN5f3RCq7:7RZzQREUWec1QIHN93R9
Threatray 6'590 similar samples on MalwareBazaar
TLSH T1E7250E3E5AA42A27B777D2614681C015F9BC81DB3A395DD742C7698C390E8027EE7F2C
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Trojan.Win32.Save.a.27031.17265
Verdict:
Suspicious activity
Analysis date:
2021-07-16 23:42:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-16 21:18:56 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
17 of 46 (36.96%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.adultpeace.com/p2io/
Unpacked files
SH256 hash:
4616a9f45edafce801bf4cc60bf28ab6001cf94b81d9607a2e0a34e3f648f8db
MD5 hash:
4b672b6d5cbfc6486d0ac8f8af4481b9
SHA1 hash:
38b775d53204c7e63d67b83add3b95f193e796b3
Detections:
win_formbook_g0 win_formbook_auto
Parent samples :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 hash:
82a4065578bf324c5a382d4e43510bfe37dc2d4accaa25792aecea77c7387714
MD5 hash:
ecff0ff8f308ad9a7ab4e8d8c6632f1f
SHA1 hash:
b2149cd8ad0767e9ee467d85f7f5d97494ecb07a
SH256 hash:
8072080eabba2c7e0390cb4defe1cf8da89943d46790a7fedf919afab58f80bf
MD5 hash:
178e2133b2e160e818f6f89c9580ed93
SHA1 hash:
2552df3eb2aa29113c172d12d3af243920605d57
SH256 hash:
f4eec4ac960e3ecb451cdf0db66594b284dfe11bbf5f3e1de718eedd10ad7123
MD5 hash:
b937d434b963f388a06b73dd795942d3
SHA1 hash:
0bad46523f4d4248e1e4623898f3b7b1ba71c493
SH256 hash:
dbd108633606663ffe38920ce2c74dee5e68fd23f510e644cfd358271099942c
MD5 hash:
3e400b3ef10d9805b1fb22cee2d474c2
SHA1 hash:
b1e644ab4e2c4b0f6c63837632196110d0f61897
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe dbd108633606663ffe38920ce2c74dee5e68fd23f510e644cfd358271099942c

(this sample)

Comments