MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1a981386664ccf1aebf2280721e69b96b824ea530bfa3dfd46714f69c86ed9cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 1a981386664ccf1aebf2280721e69b96b824ea530bfa3dfd46714f69c86ed9cb
SHA3-384 hash: 55418bf0775f0dca6747b2370a7a1f561963bf848f1a592ac780e00b2e22ac89aab563266661126e5a46bb6240f14d24
SHA1 hash: 9de2e82376ee0e185b1a8b949e1db2b78f9c6388
MD5 hash: 43e4ad88e15ad5fd22fa955706bf7851
humanhash: uranus-yankee-berlin-orange
File name:DOC-BL.exe
Download: download sample
Signature Formbook
File size:967'168 bytes
First seen:2022-05-17 13:45:02 UTC
Last seen:2022-05-17 14:47:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4589c846bd72e0ca7ac58c6162ea1f0e (2 x Formbook, 1 x NetWire)
ssdeep 12288:EbJtFabyJi8hChXdhd8HphoUdOJBvxUc8MVJvVN8RdsZU8nY+d7WQsjLf8o6d8:g7KhXdhd+dOK2V97tZUsd73h5W
Threatray 12'745 similar samples on MalwareBazaar
TLSH T123258E22B1A09C33D0632A789D0797A05926BD507F64BAB76BF01D4D6F7DB8039263D3
TrID 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.2% (.EXE) InstallShield setup (43053/19/16)
1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.2% (.SCR) Windows screen saver (13101/52/3)
File icon (PE):PE icon
dhash icon 161c9bcbd32b565b (5 x Formbook, 2 x NetWire, 1 x ModiLoader)
Reporter FORMALITYDE
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
220
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DOC-BL.exe
Verdict:
Malicious activity
Analysis date:
2022-05-17 23:15:51 UTC
Tags:
installer formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Searching for synchronization primitives
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm control.exe fareit greyware keylogger replace.exe zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 628374 Sample: DOC-BL.exe Startdate: 17/05/2022 Architecture: WINDOWS Score: 100 41 www.dems-clicks.com 2->41 43 www.dauntelgivens.com 2->43 45 dauntelgivens.com 2->45 77 Snort IDS alert for network traffic 2->77 79 Found malware configuration 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 3 other signatures 2->83 10 DOC-BL.exe 1 17 2->10         started        signatures3 process4 dnsIp5 63 l-0003.l-dc-msedge.net 13.107.43.12, 443, 49742, 49748 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 10->63 65 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49739, 49746 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 10->65 67 3 other IPs or domains 10->67 37 C:\Users\Public\Libraries\Heqsnzz.exe, PE32 10->37 dropped 39 C:\Users\...\Heqsnzz.exe:Zone.Identifier, ASCII 10->39 dropped 103 Writes to foreign memory regions 10->103 105 Allocates memory in foreign processes 10->105 107 Creates a thread in another existing process (thread injection) 10->107 109 Injects a PE file into a foreign processes 10->109 15 DpiScaling.exe 10->15         started        file6 signatures7 process8 signatures9 111 Modifies the context of a thread in another process (thread injection) 15->111 113 Maps a DLL or memory area into another process 15->113 115 Sample uses process hollowing technique 15->115 117 2 other signatures 15->117 18 explorer.exe 2 15->18 injected process10 dnsIp11 47 www.financial-free-online.com 85.13.138.35, 49786, 80 NMM-ASD-02742FriedersdorfHauptstrasse68DE Germany 18->47 49 www.bmtccareers.com 75.2.115.196, 49787, 80 AMAZON-02US United States 18->49 85 System process connects to network (likely due to code injection or exploit) 18->85 22 Heqsnzz.exe 15 18->22         started        26 Heqsnzz.exe 15 18->26         started        28 colorcpl.exe 18->28         started        30 2 other processes 18->30 signatures12 process13 dnsIp14 51 onedrive.live.com 22->51 53 lkj5aa.dm.files.1drv.com 22->53 55 dm-files.fe.1drv.com 22->55 87 Multi AV Scanner detection for dropped file 22->87 89 Writes to foreign memory regions 22->89 91 Allocates memory in foreign processes 22->91 32 logagent.exe 22->32         started        57 onedrive.live.com 26->57 59 lkj5aa.dm.files.1drv.com 26->59 61 dm-files.fe.1drv.com 26->61 93 Creates a thread in another existing process (thread injection) 26->93 95 Injects a PE file into a foreign processes 26->95 35 logagent.exe 26->35         started        97 Modifies the context of a thread in another process (thread injection) 28->97 99 Maps a DLL or memory area into another process 28->99 101 Tries to detect virtualization through RDTSC time measurements 28->101 signatures15 process16 signatures17 69 Modifies the context of a thread in another process (thread injection) 32->69 71 Maps a DLL or memory area into another process 32->71 73 Sample uses process hollowing technique 32->73 75 Tries to detect virtualization through RDTSC time measurements 32->75
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2022-05-17 06:29:24 UTC
File Type:
PE (Exe)
Extracted files:
62
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:modiloader family:xloader campaign:tee5 loader persistence rat suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
ModiLoader Second Stage
Xloader Payload
ModiLoader, DBatLoader
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
21c0fb2b53a8dc9d38a9cef684adce53f0dd311c3e8861cddda7946408f00b77
MD5 hash:
e91f52a1d9b8f23ae40be2e76017452c
SHA1 hash:
f86fd2cfcc8513e76c7c3ae74ae03d509aa3f453
SH256 hash:
1a981386664ccf1aebf2280721e69b96b824ea530bfa3dfd46714f69c86ed9cb
MD5 hash:
43e4ad88e15ad5fd22fa955706bf7851
SHA1 hash:
9de2e82376ee0e185b1a8b949e1db2b78f9c6388
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 1a981386664ccf1aebf2280721e69b96b824ea530bfa3dfd46714f69c86ed9cb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments