MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e31b0346cccb32578b30445cc2df84e12d8e33dc606d2e416857ee211995e1fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: e31b0346cccb32578b30445cc2df84e12d8e33dc606d2e416857ee211995e1fc
SHA3-384 hash: 3e5b4a00fece2783f3f7ee94e0c7ab7ea9942b6510de0dd8bddb22b2f128c3bcdc32f243583a7b284b5582b720c5ed94
SHA1 hash: f4d473bdd472a4ac0c24b8a699e61df34e1cf9bb
MD5 hash: 515ad961333064537c3e2d036d55cc7a
humanhash: three-tennessee-cup-idaho
File name:515ad961333064537c3e2d036d55cc7a.exe
Download: download sample
Signature Formbook
File size:372'369 bytes
First seen:2020-07-22 06:39:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7c2c71dfce9a27650634dc8b1ca03bf0 (160 x Loki, 58 x Formbook, 55 x Adware.Generic)
ssdeep 6144:RPCganNyus6tkMeTaxUKNOOrlGvZIrX4sGSIGoApJusq0/RpC2jrHq:Pan0+QHjOrl8ZS+p+J3FLq
Threatray 592 similar samples on MalwareBazaar
TLSH 38842312B399D477C6DB4932097EAF3CC76047A9A07F998BB7446C89A0730D34B4F299
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a file in the %temp% directory
Creating a file
Creating a file in the %AppData% subdirectories
Launching a process
Launching cmd.exe command interpreter
Deleting a recently created file
Unauthorized injection to a system process
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 249591 Sample: jfs7nR2I1t.exe Startdate: 22/07/2020 Architecture: WINDOWS Score: 100 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 3 other signatures 2->56 11 jfs7nR2I1t.exe 33 2->11         started        process3 file4 30 C:\Users\user\AppData\...\crtowordsde.dll, PE32 11->30 dropped 32 C:\Users\user\AppData\...\cpConnectionC.dll, PE32 11->32 dropped 34 C:\Users\user\AppData\...\CMAccept.exe, PE32 11->34 dropped 36 2 other files (none is malicious) 11->36 dropped 14 rundll32.exe 11->14         started        process5 signatures6 64 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->64 66 Hijacks the control flow in another process 14->66 68 Maps a DLL or memory area into another process 14->68 17 cmd.exe 14->17         started        process7 signatures8 42 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 17->42 44 Modifies the context of a thread in another process (thread injection) 17->44 46 Maps a DLL or memory area into another process 17->46 48 3 other signatures 17->48 20 explorer.exe 17->20 injected process9 dnsIp10 38 www.liangziwendao.net 20->38 40 www.investment-visas.com 20->40 23 NETSTAT.EXE 20->23         started        process11 signatures12 58 Modifies the context of a thread in another process (thread injection) 23->58 60 Maps a DLL or memory area into another process 23->60 62 Tries to detect virtualization through RDTSC time measurements 23->62 26 cmd.exe 1 23->26         started        process13 process14 28 conhost.exe 26->28         started       
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-07-22 06:41:05 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
NSIS installer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_nymaim_g0
Author:mak, msm, CERT.pl

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe e31b0346cccb32578b30445cc2df84e12d8e33dc606d2e416857ee211995e1fc

(this sample)

  
Delivery method
Distributed via web download

Comments