MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fc52523013f9198bf95daa7b6f6a597b518273b54c50635784deee1e3c9dd991. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | fc52523013f9198bf95daa7b6f6a597b518273b54c50635784deee1e3c9dd991 |
|---|---|
| SHA3-384 hash: | 2a165eb938ae3aaff7fdb794d4718cf8505867d802a135cc888d1dd6bea67800d2d2012adc57c70f6085e905c584d73e |
| SHA1 hash: | fd9833b62d81ee4ee5c143947807c7fcd3b030a5 |
| MD5 hash: | b9b729c0e574d4d8344c9e7c1a98532a |
| humanhash: | purple-gee-eleven-fifteen |
| File name: | specification.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 640'000 bytes |
| First seen: | 2023-05-15 10:23:09 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:EqUmmlA7mYCjbWesUeGetrgOUz2rMnZD9/Ec5cH:Wmm+7mY3esUeGetrFo2EZDDK |
| Threatray | 2'885 similar samples on MalwareBazaar |
| TLSH | T1A1D4CF89123BBFE2D96817F0611434824B7DA11A74B8F0FC6D9BB4C9C8DAB114BD4B67 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
242
Origin country :
HUVendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
specification.exe
Verdict:
Malicious activity
Analysis date:
2023-05-12 12:52:19 UTC
Tags:
formbook xloader trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Formbook
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Creating a process with a hidden window
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
barys comodo lokibot packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2023-05-11 14:31:20 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
20 of 37 (54.05%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 2'875 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:o17i rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Deletes itself
Formbook payload
Formbook
Unpacked files
SH256 hash:
ab3036f19998adea73263a39874391e8047cd2369ca062ef90326c7b46cdf069
MD5 hash:
d7fd54c77e6dc3ddcb7f0f442ec9f2d5
SHA1 hash:
b37657214b8a5fc14ff8e15722cdb6b86da1bd72
Detections:
FormBook
win_formbook_w0
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
7d315560fe6dd2b7ca6214d539a540938cb148969628ede47f9348f882033a4b
MD5 hash:
9ee7ebc404ce9aa851693ac5302fc0e9
SHA1 hash:
feed60fd6a8ad99b0d41d5e9be3541b0f67af93d
SH256 hash:
c72ca892abebd8794a9544913d071c3c91356f5075509717727e180e87cb98ba
MD5 hash:
25383385b11436b817ed4dc0419f4e24
SHA1 hash:
9441f35f45a30503ebb2c717209f29341b5b48b6
SH256 hash:
048ae4b9d3748d6473b3bed7d71ef7db14cd407fee7e67968ff904513be6bc7a
MD5 hash:
967999fd73b366bc49ae4b703d9e4695
SHA1 hash:
2a7969cdf9179c32c3d9114e9f4cd1bf26ecd8bb
SH256 hash:
79ceb8638a5f7a503d76bb1625b0ef3696f4c3413b586205f138df648f17c28e
MD5 hash:
d817a29fe7c60dc29df654e525d2bc0a
SHA1 hash:
17e7edfccd5fe6e25f6ed430fc5870b2049ba82a
SH256 hash:
fc52523013f9198bf95daa7b6f6a597b518273b54c50635784deee1e3c9dd991
MD5 hash:
b9b729c0e574d4d8344c9e7c1a98532a
SHA1 hash:
fd9833b62d81ee4ee5c143947807c7fcd3b030a5
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.