MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dcdd457e51bde64c24cf118ac54c8489efbc4bc55b5f1afc4facdfe673d3543e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FormBook
Vendor detections: 8
| SHA256 hash: | dcdd457e51bde64c24cf118ac54c8489efbc4bc55b5f1afc4facdfe673d3543e |
|---|---|
| SHA3-384 hash: | 0c91279a70a9b2a1488f9d4e57525bee6b2d340cb869e2595659f2a806bb3c067810750626e27670edf195b6702b8fdb |
| SHA1 hash: | 6eb95f694e04e67144a2a6cb9f5cf11bebff52ba |
| MD5 hash: | 722b7627dd1fa511d31511df19ee5e8f |
| humanhash: | london-white-enemy-bacon |
| File name: | Remittance copy.exe |
| Download: | download sample |
| Signature | FormBook |
| File size: | 388'608 bytes |
| First seen: | 2020-08-18 13:12:50 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 6144:B9+F9vQP5cgF1xFw/cFrY7/wwn8knc5JTKnCpZDMHMUvIwn5tu+3U2SuQ:+9vQP5cgTxFw/7bFnNn1HMUB5Y+3U9n |
| Threatray | 2'405 similar samples on MalwareBazaar |
| TLSH | 8984E01CBA14B29FD82BCD3AA9A41CB0476162775307F2435C5399DB6A1DEE6CF018E2 |
| Reporter | |
| Tags: | exe FormBook |
abuse_ch
Malspam distributing FormBook:HELO: mail.environment.go.ke
Sending IP: 41.89.1.174
From: ADMIN <cas@environment.go.ke>
Subject: Balance Payment_Y/ref Invoice No. 309320_ EK
Attachment: Remittance copy.rar (contains "Remittance copy.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a UDP request
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Creating a file
Launching cmd.exe command interpreter
Setting browser functions hooks
Enabling autorun by creating a file
Unauthorized injection to a system process
Detection:
formbook
Threat name:
ByteCode-MSIL.Trojan.Kryptik
Status:
Malicious
First seen:
2020-08-18 05:40:15 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
netwirerc
Similar samples:
+ 2'395 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
rat trojan spyware stealer family:formbook
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.iskovlay.com/mcn/
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Kryptik
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.