MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0c5bd52278038e9194792544aa9ba56fa2fc62cdd74b5f5e47d8ab6ee7db5d0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 0c5bd52278038e9194792544aa9ba56fa2fc62cdd74b5f5e47d8ab6ee7db5d0e
SHA3-384 hash: db144c46936a01ae1265032670cbe8ea02d73e88b984599a0a47241dcaf55556ad3d74a3d731113a9ed1e6a0826c597a
SHA1 hash: f2211c7eba8f2cc7912d540ac6391735238d0546
MD5 hash: 1ab73a4301a5c0b2e5571df9dc32aba0
humanhash: shade-lemon-juliet-double
File name:SecuriteInfo.com.Win32.TrojanX-gen.18293.25322
Download: download sample
Signature Formbook
File size:617'984 bytes
First seen:2023-04-19 10:28:39 UTC
Last seen:2023-04-24 07:59:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:GL50dttp75zBkT+hlDo4KCI8RnruO/kYm:GL50p75zBI+h+43I8RnCOMY
Threatray 2'697 similar samples on MalwareBazaar
TLSH T191D4F19DA7E9DAB7C2280F7D001665893F7452E37226C57EDF8B44ADEA43B040C89687
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
5
# of downloads :
256
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.TrojanX-gen.18293.25322
Verdict:
Malicious activity
Analysis date:
2023-04-19 10:30:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 849678 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 19/04/2023 Architecture: WINDOWS Score: 100 55 www.drdoctormedia.com 2->55 67 Snort IDS alert for network traffic 2->67 69 Found malware configuration 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 7 other signatures 2->73 11 lenRAncUgDzwq.exe 5 2->11         started        14 SecuriteInfo.com.Win32.TrojanX-gen.18293.25322.exe 7 2->14         started        signatures3 process4 file5 81 Machine Learning detection for dropped file 11->81 83 Tries to detect virtualization through RDTSC time measurements 11->83 17 lenRAncUgDzwq.exe 11->17         started        20 schtasks.exe 1 11->20         started        22 lenRAncUgDzwq.exe 11->22         started        47 C:\Users\user\AppData\...\lenRAncUgDzwq.exe, PE32 14->47 dropped 49 C:\...\lenRAncUgDzwq.exe:Zone.Identifier, ASCII 14->49 dropped 51 C:\Users\user\AppData\Local\...\tmpD88E.tmp, XML 14->51 dropped 53 SecuriteInfo.com.W...18293.25322.exe.log, ASCII 14->53 dropped 85 Uses schtasks.exe or at.exe to add and modify task schedules 14->85 87 Adds a directory exclusion to Windows Defender 14->87 24 powershell.exe 19 14->24         started        26 schtasks.exe 1 14->26         started        28 SecuriteInfo.com.Win32.TrojanX-gen.18293.25322.exe 14->28         started        signatures6 process7 signatures8 59 Modifies the context of a thread in another process (thread injection) 17->59 61 Maps a DLL or memory area into another process 17->61 63 Sample uses process hollowing technique 17->63 65 Queues an APC in another process (thread injection) 17->65 30 explorer.exe 1 1 17->30 injected 34 conhost.exe 20->34         started        36 conhost.exe 24->36         started        38 conhost.exe 26->38         started        process9 dnsIp10 57 www.gction.online 188.114.96.7, 49695, 80 CLOUDFLARENETUS European Union 30->57 89 System process connects to network (likely due to code injection or exploit) 30->89 40 colorcpl.exe 30->40         started        signatures11 process12 signatures13 75 Modifies the context of a thread in another process (thread injection) 40->75 77 Maps a DLL or memory area into another process 40->77 79 Tries to detect virtualization through RDTSC time measurements 40->79 43 cmd.exe 1 40->43         started        process14 process15 45 conhost.exe 43->45         started       
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:o17i rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Formbook payload
Formbook
Unpacked files
SH256 hash:
9e92474f4f7becbfb8be7ae557c19691840164a974fa30ea3b7191175732180f
MD5 hash:
e0ae0f3e120397ca105181e7c601ea71
SHA1 hash:
881c2197cf25e199b864b084f70bc4a0ad6052d9
SH256 hash:
5e5c8fe4e53980a98b48fe6b19155edf0f0d285ed899c61dbf4f880583ddf1d2
MD5 hash:
b3bbc5461d12f07ea893bf415dfe7c89
SHA1 hash:
40c3156c471d2afe3fd88c7d20cf93e5782e1bd6
SH256 hash:
9eaf1651ce818fe25affdeecb54775beb0c38e18dff0cea564a42ccf1048c003
MD5 hash:
24a745f4b8361552f051dc9a0d4c87ad
SHA1 hash:
27335cbd0029fdba7583fe6bc86f04f6cdb71420
SH256 hash:
56f2b2d10a20b8967cba78bf2a66c07221117b2eef45104bd180f50ebdcd1528
MD5 hash:
34def0c0f74786176bc42790747348e4
SHA1 hash:
0efc03e61197434eee5c5aade28947295fcd5a10
SH256 hash:
d8de029f2b69550a14000d99e44fdfc4440735ac33af0b01e4abc24be61955c3
MD5 hash:
dfae3c6bbf6b5aebc8fb15a2107c0660
SHA1 hash:
e4d6ba408070438f309cdbafbf4482b934aaed6b
SH256 hash:
0c5bd52278038e9194792544aa9ba56fa2fc62cdd74b5f5e47d8ab6ee7db5d0e
MD5 hash:
1ab73a4301a5c0b2e5571df9dc32aba0
SHA1 hash:
f2211c7eba8f2cc7912d540ac6391735238d0546
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments