MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f23ad612df5b25814d5448be9505bc76b8b763dfd622e69a4915736fad6d9d55. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f23ad612df5b25814d5448be9505bc76b8b763dfd622e69a4915736fad6d9d55
SHA3-384 hash: f5fb221fada8a98dea6dd6de8e9db766d800447f0f6435821d72789b2b400b649e3ef690bff28a3c57adf2368ab79c89
SHA1 hash: edef6e678a75bd9e578194d481ef62e2b7d66806
MD5 hash: 92059948d7c9d55b9a93939f577212e4
humanhash: connecticut-quebec-eight-fix
File name:Neue Bestellung 000345.scr
Download: download sample
Signature Formbook
File size:394'240 bytes
First seen:2021-10-02 06:55:58 UTC
Last seen:2021-10-02 08:27:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5ec7f7aedfe92c1b2393798c6fa1e0e0 (9 x RaccoonStealer, 3 x RedLineStealer, 2 x ArkeiStealer)
ssdeep 6144:5N1wylcPCd3l1J+bFBuLeeYx38wPJCJnxExpqJL6siOOhxxdeTr/ekI:hLWCRUBTJx8EyL6sYzxd6L
Threatray 8'338 similar samples on MalwareBazaar
TLSH T1D284DF096682CFF2D67106B1AB07C7E4053D7D6D5D2A720E3B98729E7E3D392D932206
File icon (PE):PE icon
dhash icon aeb198fa9adad898 (1 x Formbook)
Reporter abuse_ch
Tags:DEU exe FormBook geo scr

Intelligence


File Origin
# of uploads :
2
# of downloads :
153
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Neue Bestellung 000345.scr
Verdict:
Suspicious activity
Analysis date:
2021-10-02 06:57:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj
Score:
88 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2021-10-01 08:31:29 UTC
AV detection:
19 of 45 (42.22%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:dn7r rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Formbook Payload
Formbook
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
http://www.yourherogarden.net/dn7r/
Unpacked files
SH256 hash:
f23ad612df5b25814d5448be9505bc76b8b763dfd622e69a4915736fad6d9d55
MD5 hash:
92059948d7c9d55b9a93939f577212e4
SHA1 hash:
edef6e678a75bd9e578194d481ef62e2b7d66806
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments