MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1dab7f07bfa344e601226bc0657decbabd3b421fd207e031ae99ccfbc5637414. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 1dab7f07bfa344e601226bc0657decbabd3b421fd207e031ae99ccfbc5637414 |
|---|---|
| SHA3-384 hash: | 362119c8d4a817222cfcc3711d5dba784f2885723606c76b7abfce5d04c0a751430a1e19417de18396a6bcde3f1ce03f |
| SHA1 hash: | 9140c707f2e625caa4f300ccbc2c1f7136048b64 |
| MD5 hash: | 96df83409286c456fa56c37a0d5098be |
| humanhash: | kentucky-single-three-single |
| File name: | Pending payments.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 791'025 bytes |
| First seen: | 2024-09-23 13:18:37 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 890e522b31701e079a367b89393329e6 (25 x Formbook, 12 x AgentTesla, 8 x Loda) |
| ssdeep | 12288:v6Wq4aaE6KwyF5L0Y2D1PqLv/ZbzqgYP1Q7aem6GKxA4ElbxKEfbOeuOU5Km3awZ:tthEVaPqLv/Eb2nm8VEHffb/U5Km3ZkG |
| Threatray | 2'317 similar samples on MalwareBazaar |
| TLSH | T1B4F42386B740D882E4C40276C983C342CAE07E566A7DA73F7060A517BCFE125BDD67A2 |
| TrID | 86.7% (.EXE) AutoIt3 compiled script executable (510622/80/67) 4.5% (.EXE) UPX compressed Win32 Executable (27066/9/6) 4.5% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 1.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 0.8% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | b150b26869b2d471 (468 x Formbook, 101 x RedLineStealer, 94 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXv20MarkusLaszloReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::GetAce |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::timeGetTime |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::LoadLibraryA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.