MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eb41e6bf4948dda50007b3116c17c13361c81660cac092cfc7caef467deddafb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: eb41e6bf4948dda50007b3116c17c13361c81660cac092cfc7caef467deddafb
SHA3-384 hash: e7c4678e3f1a5c1b68d1d5c7a13b9c5d70ebf8ff582ec9a11e2a6abb832fe0ac28faac47207b9655505b13e6c76bf531
SHA1 hash: 55ee1e41c0057defe1f75c26495847a90d2da79f
MD5 hash: 490890c10a6706b1579103074b5b5d63
humanhash: mike-connecticut-mexico-beryllium
File name:490890c10a6706b1579103074b5b5d63.exe
Download: download sample
Signature Formbook
File size:1'352'192 bytes
First seen:2021-07-30 08:50:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:YjUS/d3fYdkxNB3s5AnMpjQ48VF6g7qsGaqSLoVHchmwRGPoN7vdiTbnFM:pyB3WWM8fGPSmHym/PoiM
Threatray 7'298 similar samples on MalwareBazaar
TLSH T13D55013588CCDFEACC9803761F8C13643EF19896B1B1E6B53E4A46B0E6C4D25E5B9742
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
592
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
490890c10a6706b1579103074b5b5d63.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-30 08:53:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 456830 Sample: oewvlm9yhw.exe Startdate: 30/07/2021 Architecture: WINDOWS Score: 100 32 www.kce0728com.net 2->32 34 www.sonderbach.net 2->34 36 www.pyithuhluttaw.net 2->36 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus detection for URL or domain 2->50 52 4 other signatures 2->52 11 oewvlm9yhw.exe 3 2->11         started        signatures3 process4 file5 30 C:\Users\user\AppData\...\oewvlm9yhw.exe.log, ASCII 11->30 dropped 62 Tries to detect virtualization through RDTSC time measurements 11->62 15 oewvlm9yhw.exe 11->15         started        signatures6 process7 signatures8 64 Modifies the context of a thread in another process (thread injection) 15->64 66 Maps a DLL or memory area into another process 15->66 68 Sample uses process hollowing technique 15->68 70 Queues an APC in another process (thread injection) 15->70 18 explorer.exe 15->18 injected process9 dnsIp10 38 www.redudiban.com 104.252.121.237, 80 EGIHOSTINGUS United States 18->38 40 www.carmelodesign.com 18->40 42 2 other IPs or domains 18->42 54 System process connects to network (likely due to code injection or exploit) 18->54 22 chkdsk.exe 12 18->22         started        signatures11 process12 dnsIp13 44 www.redudiban.com 22->44 56 Modifies the context of a thread in another process (thread injection) 22->56 58 Maps a DLL or memory area into another process 22->58 60 Tries to detect virtualization through RDTSC time measurements 22->60 26 cmd.exe 1 22->26         started        signatures14 process15 process16 28 conhost.exe 26->28         started       
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-30 08:40:45 UTC
AV detection:
14 of 46 (30.43%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader loader rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
CustAttr .NET packer
Xloader Payload
Xloader
Malware Config
C2 Extraction:
http://www.adultpeace.com/p2io/
Unpacked files
SH256 hash:
4616a9f45edafce801bf4cc60bf28ab6001cf94b81d9607a2e0a34e3f648f8db
MD5 hash:
4b672b6d5cbfc6486d0ac8f8af4481b9
SHA1 hash:
38b775d53204c7e63d67b83add3b95f193e796b3
Detections:
win_formbook_g0 win_formbook_auto
Parent samples :
556900b033c6969b8c33c7fd00a36e94561acc33357e845876abf791ede3ba27
db387432df2ea972484d10ca491dccdc021829bda4bdbd9e043acfaae645da33
b0c5cf38270aad92b5a686dcb145d2baf71a7c4dcef6b853ba3e52e9b349f4e5
4a0213993ce19c9637f964ed47e3e3b95ec5303b62583bde1751bd187037f2d2
799e54b28318ff884e20beae8e0fb5b7290b9c136f4b4e0e38765fb8792bb3e9
4d15d10d62977acbf98b94bf2d836c116b5410939809e5a961a1d9dea165c3fb
9bd1ece148b9ed05dc835703baa1acba77455de1a928b7f71b8a9af075485722
00be04f3c179dd3a875ab77116512809a278a4df6fa6e8b3d2e989a50607b180
dbd108633606663ffe38920ce2c74dee5e68fd23f510e644cfd358271099942c
62269dc86f9f29aeeeb4966505408fccefef782f08334def058cdca5884b9c4b
f1f3e9d0bcea30ca7beb1322cd888be2d0e00e5e419c5c6838aa2c63cadab65d
36fa0c2bd4ebc419638530f5ed45d4efe1a25a0703167f88bb3b9dbe6404109e
92fc9adf2b40b727d8d29c35c9bdc96929a799c2b7ba865332bc36175960458a
8d94157c8d223c29d1507a1ed3300a21eeccce8c8a49ccc05fc7c83a044517a5
eb41e6bf4948dda50007b3116c17c13361c81660cac092cfc7caef467deddafb
d8e25ce44c46057985a0467adcf4fc12d8beac599e3031f6674fd1e01988267e
71ec0c91aeec5071da283d23bceb39800e9ad6c133bb6aef99d1302f47a4ada3
a91be42c9c114a104e81719e728a94f3ba54dc619801beb22670f38524a1356f
78570fca1e6c0c1744c98077775fbb04d77e9acd34f80cb357f084ae14b97b92
a2e424247fbdda5f64d71340576e59efd380a71bdfcecc3da9a0e16968c4e709
4796f50a9d3def8541609e49eecb6edc84da6fa4400fe1c45a7ad0bf8647b6d2
639b60ea1b7a45599670bcc009ca98c0dcd5f231f65706b206456fb33e4217d3
681986a550ac1bba8275516742b4589a7069f823e1b9902df466831d043e6a2b
cde3eddb48864869869b8a59c81843b8e4fc1243170ff598ec92e28a5d7c8b2e
b4426970af41450092a479c0f387845540d168f2b3b3f42a1998f83b01997cee
013ae675443decd1083ec918ee62b59dfc8b3e17e41f96f4be21c3260a2f372b
383996c33dfd88054e6600a885efa9fe7215f81c35eed57dc09fd9321b1ea634
f3270afb61ba9b96ebb681a138a5ffb3b38d940e63006bbc70cd5e4f20f9300b
dc1c5ccb8d61106eac3205901e328a044d429c32c68b7b1c45def63ae29f1b45
c96d019e7453e5101895e5fd28388e4483d13d7c7f17979024c27d3637cb8a8b
8011f6905421ffe56380b453cfab0145621402b3db3b86108d4d609cacd1647a
23f8ea6f79340ef82479018b1b9d98348d0f8c873db0142c4dc6b0da8152e394
fba139a2a479842da07b4c0829460b585fbe2ff58565428611ad7a9a7efc40c4
SH256 hash:
60a70cfc25fce4b1fe95adb884c83be0b2d669acdcc8a3adb3e966a36bd70931
MD5 hash:
f94a99e8f6e9c7b98c45b5ca06f5bded
SHA1 hash:
a807d8161db289d7267d8b9f0cb8a404b0831fa7
SH256 hash:
97d2fa1d01b2f9a2199896e05e0cf60c14a9f41ef2d72e15fbb862b7afa08438
MD5 hash:
68463851c0e6fe7a254c99fae763d454
SHA1 hash:
4587a5371d88c296a0184fe47ee0c5245b187127
SH256 hash:
eb41e6bf4948dda50007b3116c17c13361c81660cac092cfc7caef467deddafb
MD5 hash:
490890c10a6706b1579103074b5b5d63
SHA1 hash:
55ee1e41c0057defe1f75c26495847a90d2da79f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe eb41e6bf4948dda50007b3116c17c13361c81660cac092cfc7caef467deddafb

(this sample)

  
Delivery method
Distributed via web download

Comments