MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fb1b538251b7c9a011807fee199f1446b68c40e9caed0709389eac91e311bf1e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: fb1b538251b7c9a011807fee199f1446b68c40e9caed0709389eac91e311bf1e
SHA3-384 hash: 4d9e5a6deced2d7fe324dfac6a8bc33a2b4da9b63807836725a66dc0224a7b31c2573b2b79b143443857be93b02b75fa
SHA1 hash: e5d67a362ae9c51449000987f42882fba4d402df
MD5 hash: 0377728dc176c34ec287a4ee6e1b6800
humanhash: sad-steak-robert-six
File name:15012021567.exe
Download: download sample
Signature Formbook
File size:801'280 bytes
First seen:2021-01-15 07:15:25 UTC
Last seen:2021-01-15 09:12:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 12288:lF8jbr1Ka44cRD5W/NlCrijdOuKUrg2WuXW4jlc2aBu/eJa:lOr1K5BMlljdUIg2NX/m2axJ
Threatray 3'440 similar samples on MalwareBazaar
TLSH 59056A10ABD19700E7FC67BD282010611BF5EB6AF7F9E35CDD4060795EA2A1844FE7A2
Reporter abuse_ch
Tags:exe FormBook geo KOR


Avatar
abuse_ch
Malspam distributing Formbook:

HELO: mail-smail-vm51.hanmail.net
Sending IP: 203.133.180.239
From: 빈둥지 <byoungsmin1369@hanmail.net>
Subject: 견적 요청 /RFQ-15012021543 Order
Attachment: 15012021567.cab (contains "15012021567.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
15012021567.exe
Verdict:
Malicious activity
Analysis date:
2021-01-15 07:26:56 UTC
Tags:
trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
84 / 100
Signature
.NET source code contains potential unpacker
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM_3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 340155 Sample: 15012021567.exe Startdate: 15/01/2021 Architecture: WINDOWS Score: 84 19 Malicious sample detected (through community Yara rule) 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Yara detected AntiVM_3 2->23 25 4 other signatures 2->25 6 15012021567.exe 3 2->6         started        process3 file4 17 C:\Users\user\AppData\...\15012021567.exe.log, ASCII 6->17 dropped 9 15012021567.exe 6->9         started        11 15012021567.exe 6->11         started        13 15012021567.exe 6->13         started        15 2 other processes 6->15 process5
Threat name:
ByteCode-MSIL.Spyware.Noon
Status:
Malicious
First seen:
2021-01-15 04:24:03 UTC
AV detection:
13 of 46 (28.26%)
Threat level:
  2/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Gathers network information
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
Malware Config
C2 Extraction:
http://www.southsideflooringcreations.com/dkk/
Unpacked files
SH256 hash:
ef897a9a9f0daf87183137cf36cfd3bcb36bbda74165d320668b17732e0ac61e
MD5 hash:
15554a5ed05f7ff8dfaad521ccfae743
SHA1 hash:
7d45f2d91d4eecd6a4a4afb0d0f2c2e270c6ea60
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
60437268311fdd67dac526cbf2c5aefb5cf40284d58c5a3cc1a2c1ed60d89b51
MD5 hash:
e81c45db8c1cdcce5c56976e0df3ea6c
SHA1 hash:
2d83ce8bb19dc69d08588c1a5001f881d1e65f17
SH256 hash:
296620e9308a1069ca98d27c426f25f5c1f87d9240bb371c657571034b0261b5
MD5 hash:
4cf24d41a7882216740280e3294cb853
SHA1 hash:
6bcb31d3dc0a7d71da1067a628168664202769a4
SH256 hash:
fb1b538251b7c9a011807fee199f1446b68c40e9caed0709389eac91e311bf1e
MD5 hash:
0377728dc176c34ec287a4ee6e1b6800
SHA1 hash:
e5d67a362ae9c51449000987f42882fba4d402df
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe fb1b538251b7c9a011807fee199f1446b68c40e9caed0709389eac91e311bf1e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments