MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece
SHA3-384 hash: 4c19faaa2a38ef2f0a0305a7441b5b8ede45d4096a2dd5e115db14180573f9ee32509b868a84ea5ff31ad449d4eefa2f
SHA1 hash: 25c25c70ba0e88f4952fb739df0e9d48896b71fd
MD5 hash: 20f7d95a5ff1ad22ebabc1037556c014
humanhash: bluebird-xray-angel-mars
File name:Adjunto orden de compra.exe
Download: download sample
Signature Formbook
File size:1'156'096 bytes
First seen:2022-03-20 09:57:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 066f2adf6884c84166ea572f3442e2f3 (8 x Formbook, 2 x RemcosRAT)
ssdeep 12288:RbojJKNbgMwT2NRAvS/yqenMbJjRsBp8oziAO8Iz2sVW3MUqI6F3HAhcAszeVQ18:elKiCRAvS6qOMZGBNgzyqTHAhU2
Threatray 14'519 similar samples on MalwareBazaar
TLSH T185355BF2E2908832D4223A384C5F5EB9B52A7E01DDE86546E6E43F093F3D571EC12A57
File icon (PE):PE icon
dhash icon 342c6c9c97cc6492 (11 x Formbook, 9 x RemcosRAT, 1 x AveMariaRAT)
Reporter TeamDreier
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
301
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Searching for synchronization primitives
Launching cmd.exe command interpreter
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm control.exe keylogger replace.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 592749 Sample: Adjunto orden de compra.exe Startdate: 20/03/2022 Architecture: WINDOWS Score: 100 63 Multi AV Scanner detection for domain / URL 2->63 65 Found malware configuration 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 9 other signatures 2->69 10 Adjunto orden de compra.exe 1 17 2->10         started        15 explorer.exe 26 2->15         started        process3 dnsIp4 49 onedrive.live.com 10->49 51 dm-files.fe.1drv.com 10->51 53 1o0srw.dm.files.1drv.com 10->53 37 C:\Users\Public\Pbadbrs.exe, PE32 10->37 dropped 39 C:\Users\Public\srbdabP.url, MS 10->39 dropped 41 C:\Users\Public\Pbadbrs.exe:Zone.Identifier, ASCII 10->41 dropped 85 Writes to foreign memory regions 10->85 87 Allocates memory in foreign processes 10->87 89 Creates a thread in another existing process (thread injection) 10->89 91 Injects a PE file into a foreign processes 10->91 17 logagent.exe 10->17         started        file5 signatures6 process7 signatures8 55 Modifies the context of a thread in another process (thread injection) 17->55 57 Maps a DLL or memory area into another process 17->57 59 Sample uses process hollowing technique 17->59 61 2 other signatures 17->61 20 explorer.exe 17->20 injected process9 process10 22 Pbadbrs.exe 15 20->22         started        26 cmd.exe 20->26         started        28 help.exe 20->28         started        dnsIp11 43 l-0004.dc-msedge.net 13.107.43.13, 443, 49785, 49788 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->43 45 192.168.2.1 unknown unknown 22->45 47 3 other IPs or domains 22->47 71 Multi AV Scanner detection for dropped file 22->71 73 Writes to foreign memory regions 22->73 75 Allocates memory in foreign processes 22->75 83 2 other signatures 22->83 30 logagent.exe 22->30         started        77 Modifies the context of a thread in another process (thread injection) 26->77 79 Maps a DLL or memory area into another process 26->79 81 Tries to detect virtualization through RDTSC time measurements 26->81 33 cmd.exe 1 26->33         started        signatures12 process13 signatures14 93 Modifies the context of a thread in another process (thread injection) 30->93 95 Maps a DLL or memory area into another process 30->95 97 Sample uses process hollowing technique 30->97 35 conhost.exe 33->35         started        process15
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-03-17 10:12:21 UTC
File Type:
PE (Exe)
Extracted files:
43
AV detection:
28 of 42 (66.67%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:3nop persistence rat spyware stealer trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Formbook Payload
Formbook
Unpacked files
SH256 hash:
1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece
MD5 hash:
20f7d95a5ff1ad22ebabc1037556c014
SHA1 hash:
25c25c70ba0e88f4952fb739df0e9d48896b71fd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments