MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d09e99b2a15cae89b2b6c61ae744d8437b2289615d909ee58ee52ac865b5872. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: 0d09e99b2a15cae89b2b6c61ae744d8437b2289615d909ee58ee52ac865b5872
SHA3-384 hash: 829e4830c5f0449d6a38666ebef0eb1dac78e7f0c170f815759186e62e1885da5dedfc235be28c62b6f7955386a67478
SHA1 hash: 321b6e9c30f9391c3ca00e0025ee4cf19e17f4bf
MD5 hash: 3e22bc223e94878c8b380d6bfc4bac20
humanhash: johnny-pennsylvania-bacon-salami
File name:SecuriteInfo.com.Variant.Jaik.107269.5046.9762
Download: download sample
Signature Formbook
File size:293'663 bytes
First seen:2022-12-07 01:28:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ab6770b0a8635b9d92a5838920cfe770 (84 x Formbook, 30 x AgentTesla, 15 x Loki)
ssdeep 6144:LBnbBIuIily2SrpGAthgLVgaxMACC/u8RJyU39soBvWT05r7n1:FJTly2SsAtmLVgaWlyu8RJN19W0Z
TLSH T15154F1D3F0A0685EF5CF5277B9AA0E76F2E225520903090353F12F9A7F111C7E686A6D
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon d4923292e2ccb4c0 (13 x AgentTesla, 7 x Formbook, 3 x Loki)
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
226
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
SecuriteInfo.com.Variant.Jaik.107269.5046.9762
Verdict:
Malicious activity
Analysis date:
2022-12-07 01:31:31 UTC
Tags:
formbook xloader trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for the window
Сreating synchronization primitives
Launching a process
DNS request
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process
Searching for synchronization primitives
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 762256 Sample: SecuriteInfo.com.Variant.Ja... Startdate: 07/12/2022 Architecture: WINDOWS Score: 100 30 www.bakels-genot.com 2->30 32 bakels-genot.com 2->32 48 Multi AV Scanner detection for domain / URL 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Antivirus detection for URL or domain 2->52 54 5 other signatures 2->54 10 SecuriteInfo.com.Variant.Jaik.107269.5046.9762.exe 19 2->10         started        signatures3 process4 file5 28 C:\Users\user\AppData\Local\...\dvpitukm.exe, PE32 10->28 dropped 13 dvpitukm.exe 1 10->13         started        process6 signatures7 66 Multi AV Scanner detection for dropped file 13->66 68 Maps a DLL or memory area into another process 13->68 16 dvpitukm.exe 13->16         started        19 conhost.exe 13->19         started        process8 signatures9 40 Modifies the context of a thread in another process (thread injection) 16->40 42 Maps a DLL or memory area into another process 16->42 44 Sample uses process hollowing technique 16->44 46 Queues an APC in another process (thread injection) 16->46 21 explorer.exe 16->21 injected process10 dnsIp11 34 www.commongoodprojects.com 216.40.34.41, 49696, 80 TUCOWSCA Canada 21->34 36 td-ccm-168-233.wixdns.net 34.117.168.233, 49697, 49698, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 21->36 38 2 other IPs or domains 21->38 56 System process connects to network (likely due to code injection or exploit) 21->56 25 cmmon32.exe 13 21->25         started        signatures12 process13 signatures14 58 Tries to steal Mail credentials (via file / registry access) 25->58 60 Tries to harvest and steal browser information (history, passwords, etc) 25->60 62 Modifies the context of a thread in another process (thread injection) 25->62 64 Maps a DLL or memory area into another process 25->64
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-12-07 01:01:22 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
27 of 40 (67.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:k6n9 rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Executes dropped EXE
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
191ce48d6e0f31986de6425c9cbc36606b8234740b42ec0eeb931ed718aea267
MD5 hash:
336530c447c306b08eae5e3007b60566
SHA1 hash:
7b93b113d140d1d215c4009109b117e7f302dae6
Detections:
XLoader win_formbook_auto win_formbook_g0
SH256 hash:
5c773c9a3cb12e2241f8b533d5d47022d5d3aaa69e1944f4c55310dbdc49fc1a
MD5 hash:
4db514a22af97956b68bd5f9edf4ad80
SHA1 hash:
574c4eab6067fef0c216199238d3f8375ac22ade
SH256 hash:
896f581caa303ac112cee949c891885e7e3b84e66fc840c9e94169ba9d35e069
MD5 hash:
1faa45e14fe03e78207dd61fc06cebcc
SHA1 hash:
a4543f2d4229c545470b6ea0a9d6a5757c98136c
SH256 hash:
0d09e99b2a15cae89b2b6c61ae744d8437b2289615d909ee58ee52ac865b5872
MD5 hash:
3e22bc223e94878c8b380d6bfc4bac20
SHA1 hash:
321b6e9c30f9391c3ca00e0025ee4cf19e17f4bf
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments