MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f84b362a10ce6a355e3d48e602f672416acddab0194b1dc0ffaa01213bf28d2a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: f84b362a10ce6a355e3d48e602f672416acddab0194b1dc0ffaa01213bf28d2a
SHA3-384 hash: 8688ac134888f9c5ab8d841230bf90f8e693081bf29626b24365e50c67e5d7d0fb66eedfd13184662420db542672667a
SHA1 hash: 8d27ee25b4ecec41a89a84dfc01965d4b0cd38d7
MD5 hash: 964873405cd08188addb3258d9da28bc
humanhash: cup-artist-fanta-bulldog
File name:Re Teklif Siparişlerini Onayla - E1105,pdf.exe
Download: download sample
Signature Formbook
File size:533'975 bytes
First seen:2022-02-23 12:03:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 6144:kxDy4sYGXWwpKgn3hFuqQCdRJ1fHvL9HNnBmVl3WnjRr:IGXWwpKuFui3JxDvOWnjRr
Threatray 16'313 similar samples on MalwareBazaar
TLSH T197B44BC1D6883CF5F81917724D36AD222157BE7CA9B4542E695EB42A5BF328330F2C1B
File icon (PE):PE icon
dhash icon 1f1c4bca1b2d1f1b (3 x SnakeKeylogger, 2 x Formbook, 1 x RemcosRAT)
Reporter abuse_ch
Tags:exe FormBook geo TUR

Intelligence


File Origin
# of uploads :
1
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 577182 Sample: Re Teklif Sipari#U015flerin... Startdate: 23/02/2022 Architecture: WINDOWS Score: 100 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus detection for URL or domain 2->47 49 6 other signatures 2->49 11 Re Teklif Sipari#U015flerini Onayla - E1105,pdf.exe 18 2->11         started        process3 file4 33 C:\Users\user\AppData\Local\Temp\bwbyo.exe, PE32 11->33 dropped 14 bwbyo.exe 11->14         started        process5 signatures6 57 Tries to detect virtualization through RDTSC time measurements 14->57 17 bwbyo.exe 14->17         started        process7 signatures8 35 Modifies the context of a thread in another process (thread injection) 17->35 37 Maps a DLL or memory area into another process 17->37 39 Sample uses process hollowing technique 17->39 41 Queues an APC in another process (thread injection) 17->41 20 explorer.exe 17->20 injected process9 process10 22 svchost.exe 20->22         started        25 autochk.exe 20->25         started        signatures11 51 Modifies the context of a thread in another process (thread injection) 22->51 53 Maps a DLL or memory area into another process 22->53 55 Tries to detect virtualization through RDTSC time measurements 22->55 27 cmd.exe 1 22->27         started        29 explorer.exe 2 159 22->29         started        process12 process13 31 conhost.exe 27->31         started       
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-02-23 12:04:12 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Enumerates physical storage devices
Unpacked files
SH256 hash:
389e0d9081335f9588fe7b116fe98d5a7ee8a0b51855faa85eda7d07e58aa0ed
MD5 hash:
e26e2015dce280faaa5840d54ed59e77
SHA1 hash:
f86cb579268a7b7dfa3dcc301231ded8423986c8
SH256 hash:
f84b362a10ce6a355e3d48e602f672416acddab0194b1dc0ffaa01213bf28d2a
MD5 hash:
964873405cd08188addb3258d9da28bc
SHA1 hash:
8d27ee25b4ecec41a89a84dfc01965d4b0cd38d7
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments