MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0fdc5a8bd9026a352ad7c986e4c690f7a85924235ef648a2a313f12f9ea885d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 0fdc5a8bd9026a352ad7c986e4c690f7a85924235ef648a2a313f12f9ea885d5
SHA3-384 hash: 0ac902e416480b45afb8c075ac348cc08bc508ed2af1b2efb506e3b09e630a8e965125083dbb6af0dfe76da38e73a5c8
SHA1 hash: 7e78d8570520cd68aa3e7a2c01533e90f82b16e9
MD5 hash: 9c3837d28d575a3dc7a4818401c139ae
humanhash: massachusetts-winter-purple-arizona
File name:INVOICE.exe
Download: download sample
Signature Formbook
File size:669'184 bytes
First seen:2023-04-21 13:03:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:0FW33jCm1qZYdF8pobx4L/xZzOdYzKKw/OTAUUjZ1r:0433jFL8ydyJ9OSzKK7AH
Threatray 2'672 similar samples on MalwareBazaar
TLSH T1F4E4F171215EC5D0F01FCBB165B8FCB2167270F3D6E889350B2AA580CE5BF146D89A9B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 2624349dc0c0c0c0 (3 x Formbook)
Reporter James_inthe_box
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
266
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
INVOICE.exe
Verdict:
Malicious activity
Analysis date:
2023-04-21 13:04:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Launching a process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Deletes itself after installation
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2023-04-21 07:00:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
16
AV detection:
13 of 36 (36.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Enumerates system info in registry
Gathers network information
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Unpacked files
SH256 hash:
d5ae693ca9561d9b6756f25f0d88573e4b10287ce2dde30993303ececbe9e780
MD5 hash:
644813507d720f1ecb69c1fb563491c1
SHA1 hash:
2d1e046b4160bcc1b7f0e2cbefeeeaf6bc5ee11a
SH256 hash:
686d7a0f616c32c209dbc486d15fc72b99246a22a7063f31bef14cf3dbefc608
MD5 hash:
db1b60e5ba59ba71e3206ff672d10a01
SHA1 hash:
f605cd33fbf3159bc77452cbd78e7f8b4159e65b
SH256 hash:
21f0154b51a09767f94922b81f5fcd15cf4a6390ab7314e40d0e17b2dcdfe6ba
MD5 hash:
c926563698de3a89ad20474c85122f73
SHA1 hash:
ed1a3b2527ace111e6f39880c7ee3965f301330d
SH256 hash:
99d97854fa41e9e96288a5c82091c84f96f858c79c3099036599a9cc018f07ef
MD5 hash:
0df30e5d2b01bc155a540c45317a5978
SHA1 hash:
73f0104189bed6224f8bb3d3c16eb060a874e7ed
SH256 hash:
107e5551f298f93eefe525da79307455537fdd156bd48df7e271f9561c72a555
MD5 hash:
c94d034ddcce18b72ad13463035ce90d
SHA1 hash:
26116eff05a8e1764e92aa51de7b2d646b2a6baa
SH256 hash:
0fdc5a8bd9026a352ad7c986e4c690f7a85924235ef648a2a313f12f9ea885d5
MD5 hash:
9c3837d28d575a3dc7a4818401c139ae
SHA1 hash:
7e78d8570520cd68aa3e7a2c01533e90f82b16e9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments