MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 149f35c9dccbb1f3118657af9168f338ad983a38f33a26a5691af1e763ef9376. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: 149f35c9dccbb1f3118657af9168f338ad983a38f33a26a5691af1e763ef9376
SHA3-384 hash: 55d101b9e54dc0d494d6c7aadadfcab2be77ed4387d3ba39f4aed8a2eb1173b95c2d93d70d92cb1cda0f3f10b7c02221
SHA1 hash: 9e579d4ec49c5c3b0d4ec2b5e836adae7ee01879
MD5 hash: 2a9e138f0a9873295acba111bd585b82
humanhash: carpet-high-louisiana-aspen
File name:PO324524525627.exe
Download: download sample
Signature Formbook
File size:741'376 bytes
First seen:2022-04-27 08:16:57 UTC
Last seen:2022-05-03 14:37:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ecb9b41606c207da30bc912e53c7a0c9 (2 x DBatLoader, 2 x Formbook, 1 x ModiLoader)
ssdeep 12288:jRafoJF97sEgQPv6AGL2kEaJJAlq7wbOfWtPFHFGX5mR0XJuk1INQKzaRHrem:cgJFX5yAAJJAlq72OfWN+5pXkkArzy
TLSH T1D9F48E16A2904436D0721E784D5FA2B4A825BD10FE28DC563AF5DF4C7F392C17A3E2A7
TrID 44.6% (.EXE) InstallShield setup (43053/19/16)
14.7% (.EXE) Win32 Executable Delphi generic (14182/79/4)
13.5% (.SCR) Windows screen saver (13101/52/3)
10.9% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon e0e4a3a6a4b8b8a8 (37 x Formbook, 9 x AZORult, 9 x Loki)
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
270
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Searching for synchronization primitives
Launching cmd.exe command interpreter
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe greyware keylogger remote.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 616407 Sample: PO324524525627.exe Startdate: 27/04/2022 Architecture: WINDOWS Score: 100 44 www.fu5544.com 2->44 46 301.6688dns.com 2->46 74 Found malware configuration 2->74 76 Malicious sample detected (through community Yara rule) 2->76 78 Antivirus detection for URL or domain 2->78 80 8 other signatures 2->80 11 PO324524525627.exe 1 17 2->11         started        signatures3 process4 dnsIp5 60 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49737, 49742 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 11->60 62 onedrive.live.com 11->62 64 2 other IPs or domains 11->64 40 C:\Users\Public\Libraries\Vguwtsi.exe, PE32 11->40 dropped 42 C:\Users\...\Vguwtsi.exe:Zone.Identifier, ASCII 11->42 dropped 100 Writes to foreign memory regions 11->100 102 Allocates memory in foreign processes 11->102 104 Creates a thread in another existing process (thread injection) 11->104 106 Injects a PE file into a foreign processes 11->106 16 logagent.exe 11->16         started        file6 signatures7 process8 signatures9 66 Modifies the context of a thread in another process (thread injection) 16->66 68 Maps a DLL or memory area into another process 16->68 70 Sample uses process hollowing technique 16->70 72 2 other signatures 16->72 19 explorer.exe 4 2 16->19 injected process10 process11 21 Vguwtsi.exe 15 19->21         started        25 Vguwtsi.exe 15 19->25         started        27 help.exe 19->27         started        29 2 other processes 19->29 dnsIp12 48 onedrive.live.com 21->48 50 l-0004.l-dc-msedge.net 21->50 56 2 other IPs or domains 21->56 82 Antivirus detection for dropped file 21->82 84 Multi AV Scanner detection for dropped file 21->84 86 Writes to foreign memory regions 21->86 31 logagent.exe 21->31         started        52 onedrive.live.com 25->52 54 l-0004.l-dc-msedge.net 25->54 58 2 other IPs or domains 25->58 88 Allocates memory in foreign processes 25->88 90 Creates a thread in another existing process (thread injection) 25->90 92 Injects a PE file into a foreign processes 25->92 34 logagent.exe 25->34         started        94 Modifies the context of a thread in another process (thread injection) 27->94 96 Maps a DLL or memory area into another process 27->96 98 Tries to detect virtualization through RDTSC time measurements 27->98 36 cmd.exe 1 27->36         started        signatures13 process14 signatures15 108 Modifies the context of a thread in another process (thread injection) 31->108 110 Maps a DLL or memory area into another process 31->110 112 Sample uses process hollowing technique 31->112 38 conhost.exe 36->38         started        process16
Threat name:
Win32.Trojan.Hesv
Status:
Malicious
First seen:
2022-04-25 15:06:54 UTC
File Type:
PE (Exe)
Extracted files:
77
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:modiloader family:xloader campaign:uj3c loader persistence rat suricata trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Blocklisted process makes network request
ModiLoader Second Stage
Xloader Payload
ModiLoader, DBatLoader
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
f0b40f8f7e36da9257b6df7c2a2b6a008be050cf5fdcd477a0415c6c96b4b9f5
MD5 hash:
c1a72ee7162580adf97d03f8b7acaf29
SHA1 hash:
2e9f9d3f24cd773ac1ed82172292e88e799d177b
Detections:
win_dbatloader_w0
Parent samples :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 hash:
149f35c9dccbb1f3118657af9168f338ad983a38f33a26a5691af1e763ef9376
MD5 hash:
2a9e138f0a9873295acba111bd585b82
SHA1 hash:
9e579d4ec49c5c3b0d4ec2b5e836adae7ee01879
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_Formbook_strings
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:pdb2
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 149f35c9dccbb1f3118657af9168f338ad983a38f33a26a5691af1e763ef9376

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments