MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f1ca0286fa691166ab71220ee3243bcfa4e73b17247e382edaf6c1590d50d3a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: f1ca0286fa691166ab71220ee3243bcfa4e73b17247e382edaf6c1590d50d3a2
SHA3-384 hash: 5e9e8d52a1ae5c9d2f914991591bf0068ec0ecb01964a7c397ce00a57186c8868b7e28f1192be6fade3c40425fc3a886
SHA1 hash: 2685514ab302b87fe8f7d1bb89ef8c0e3abe9707
MD5 hash: d02374d149e3278e025c6a63834d7223
humanhash: hawaii-sierra-cat-neptune
File name:SecuriteInfo.com.BehavesLike.Win32.Generic.dc.15857
Download: download sample
Signature Formbook
File size:1'004'032 bytes
First seen:2020-11-23 14:11:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'655 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 24576:HsABOgJTfgSBgWhePcdGTZMQilD8RbkOQof+a:H6SBggIcdBCbpfV
Threatray 3'006 similar samples on MalwareBazaar
TLSH 7325D016AB886FA9F07D53745464142883F0FD17E725EE8D7EDC24CE09A2F88E726B11
Reporter SecuriteInfoCom
Tags:FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
207
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
Creating a file
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM_3
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-11-23 10:35:15 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.thesiromiel.com/kgw/
Unpacked files
SH256 hash:
f1ca0286fa691166ab71220ee3243bcfa4e73b17247e382edaf6c1590d50d3a2
MD5 hash:
d02374d149e3278e025c6a63834d7223
SHA1 hash:
2685514ab302b87fe8f7d1bb89ef8c0e3abe9707
SH256 hash:
042e28fc74e12c11adf606cabe9878bd01a6857f3dc3262d74fdc8bdad92d3ba
MD5 hash:
821e41d6289ddf684d92ace7dea1d159
SHA1 hash:
1839dda3d179c3c36a1d9516b60ef7f20c9622c0
SH256 hash:
c8671a87d685f2354d96f3cfcad530dfa5f3ec535a0f5ec14940d81fb857813b
MD5 hash:
b5358f677850210361f573c7d249c258
SHA1 hash:
215e06e319515d779efa88f7c05b343d6ec3f6a5
SH256 hash:
c6fcf5d515d56cf746b4c4aa4695f11e9ad7f6063a96cda810bf39dc47c5a7a0
MD5 hash:
47509d9db24c975e55c287afdc459fad
SHA1 hash:
4f1f893555c985d7cbba731cf1fdbf49c6ecf793
SH256 hash:
64f55989963f21c757cb2c9e52cc307ee27c181a1b8b991b648f911aa9e782bd
MD5 hash:
514cf689734c2ce24548389acde42a77
SHA1 hash:
d216c768af8acd15ab5205dd18939da7cb81a988
SH256 hash:
b087a4c845235d514eb24a87f9af3c3f4171050906450d2d185e056caa4ba0f6
MD5 hash:
63ba6b8c7406b7c5af6526977517a7bf
SHA1 hash:
704e4e782aa010d23342b5bff350024a355c88d4
Detections:
win_formbook_g0 win_formbook_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe f1ca0286fa691166ab71220ee3243bcfa4e73b17247e382edaf6c1590d50d3a2

(this sample)

  
Delivery method
Distributed via web download

Comments