MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1464b060a662f7629adb0bd7399a105e13fd6e8570180f7dc43636aad2b53c04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 1464b060a662f7629adb0bd7399a105e13fd6e8570180f7dc43636aad2b53c04
SHA3-384 hash: e3e00e6f133a9afe46f8973f6971e88bf169532ee4cde5d6adf614831bc2ad5c1eae5af74f8f59d2bf9a97cb472188f5
SHA1 hash: 84ab9f936d59b4837821ea59217286caf6466e11
MD5 hash: 3cbc50037c3bd685e6704ea938d1f470
humanhash: washington-kentucky-carbon-delaware
File name:DG2b3P7hOHbJs2d.exe
Download: download sample
Signature Formbook
File size:647'168 bytes
First seen:2022-11-02 04:23:25 UTC
Last seen:2022-11-02 21:58:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:qwhuJDNjoEP/lfoHgjpuA3kIO8LayHHxhQvhzps7:xuJJ/oAoA3kN8eyHIs7
TLSH T153D4235371A16199F87A07F986A647F03BF06C50BC42D62F14C6B2CE2A727CA8B85177
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter GovCERT_CH
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
4
# of downloads :
274
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DG2b3P7hOHbJs2d.exe
Verdict:
Malicious activity
Analysis date:
2022-11-02 04:26:49 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
formbook packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 735616 Sample: DG2b3P7hOHbJs2d.exe Startdate: 02/11/2022 Architecture: WINDOWS Score: 100 31 www.xingxing0123.top 2->31 35 Snort IDS alert for network traffic 2->35 37 Multi AV Scanner detection for domain / URL 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 7 other signatures 2->41 9 DG2b3P7hOHbJs2d.exe 3 2->9         started        signatures3 process4 file5 23 C:\Users\user\...\DG2b3P7hOHbJs2d.exe.log, ASCII 9->23 dropped 51 Injects a PE file into a foreign processes 9->51 13 DG2b3P7hOHbJs2d.exe 9->13         started        signatures6 process7 signatures8 53 Modifies the context of a thread in another process (thread injection) 13->53 55 Maps a DLL or memory area into another process 13->55 57 Sample uses process hollowing technique 13->57 59 Queues an APC in another process (thread injection) 13->59 16 explorer.exe 13->16 injected process9 dnsIp10 25 www.succes-digitalmlm.com 16->25 27 www.rcquad.com 156.254.147.131, 49699, 49700, 80 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 16->27 29 9 other IPs or domains 16->29 33 System process connects to network (likely due to code injection or exploit) 16->33 20 chkdsk.exe 13 16->20         started        signatures11 process12 signatures13 43 Tries to steal Mail credentials (via file / registry access) 20->43 45 Tries to harvest and steal browser information (history, passwords, etc) 20->45 47 Deletes itself after installation 20->47 49 2 other signatures 20->49
Threat name:
ByteCode-MSIL.Trojan.REMLoader
Status:
Malicious
First seen:
2022-11-01 09:47:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
22
AV detection:
30 of 41 (73.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:axe3 rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
de11a456c948ba4282c7add9fb49e2a9ecc30dd91594298c63472b795c120d8b
MD5 hash:
57d646cb8f88dc43e80bef7392c6d1d5
SHA1 hash:
c0072144218ce3cd497c5c7515c3eabd8837b703
SH256 hash:
15d73a776fe344c81d89f8c1403a88694e798a4698997b7e71ff8cd285043e5e
MD5 hash:
30f4d7c4a68786ee7add65357696b171
SHA1 hash:
f1dc5ea4551456140bda5f1be92ea156260cab2f
SH256 hash:
f1a3011806744853a52b38c4b3a25a252778e8f95a65b84abf666c0bf407c5ea
MD5 hash:
b5360b4990172ae2cf62fb7c42a65f39
SHA1 hash:
c704ae613327148a4f8753b9a01ce245bf784600
SH256 hash:
7f272c4db499b1501a5ea1711d23de0e6a0c07faf16275e9b01722dae889c7c9
MD5 hash:
dd8b9511dda8eb7c84e1621046828883
SHA1 hash:
7f715270ffcadcba5c3148d2a0cecfaaf6c2e805
SH256 hash:
8290cfcf2c033e487f4d85f8dfe4f8fde109b3f97bcd69373e0ceffc1a2edbc1
MD5 hash:
4df4fa3114b1494b8de9a42dc596591c
SHA1 hash:
43144cce608196bb39f4caece299d500a732f44c
SH256 hash:
2a9ae17df8374f03f09117f7ef62d41efb46d30f0c59b4b164007039afdb0fd2
MD5 hash:
b241a7223974c40263b3822ea45233da
SHA1 hash:
6f641b3dbaf366609bec2f67ac2bfd7a92d795cc
SH256 hash:
1464b060a662f7629adb0bd7399a105e13fd6e8570180f7dc43636aad2b53c04
MD5 hash:
3cbc50037c3bd685e6704ea938d1f470
SHA1 hash:
84ab9f936d59b4837821ea59217286caf6466e11
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 1464b060a662f7629adb0bd7399a105e13fd6e8570180f7dc43636aad2b53c04

(this sample)

  
Dropped by
formbook
  
Delivery method
Distributed via e-mail attachment

Comments