MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ee8f74b653016439763a3ddd7dda2fc684143585a3bb84453061279001a5f4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 1ee8f74b653016439763a3ddd7dda2fc684143585a3bb84453061279001a5f4f
SHA3-384 hash: 022fc1faa94b944a4d23b4389e1a1a1cc92f1a46145f139ebffab3a08eae0948cb92347904e34a8720da63355364e801
SHA1 hash: 726ec69f9cc02f71d2b9b9503d5b2a4ff4ecee32
MD5 hash: b7a2f8a222e9a20ba4e1c1a2d4b11fe7
humanhash: florida-thirteen-pip-don
File name:1.bat
Download: download sample
Signature Formbook
File size:294'692 bytes
First seen:2023-09-01 07:53:42 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 6144:aWe+EhI5HXCCrufClEsJLqnE5q/iawq4Ec:ad+EO5Xtu2Es4n2s47
Threatray 2 similar samples on MalwareBazaar
TLSH T11054CF84D1F1AE5B8AE7BB51350A2C5D81952E8742D993F0D408A5F3E3F7E69CC3AC11
Reporter petrovic
Tags:bat FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
97
Origin country :
FI FI
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://cdn.discordapp.com/attachments/1146081823395418193/1146527677470232727/Bratty-Family.rar
Verdict:
Malicious activity
Analysis date:
2023-08-30 23:48:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
powershell
Result
Verdict:
MALICIOUS
Result
Threat name:
AsyncRAT, StormKitty, Strela Stealer, Ve
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Disable Windows Defender notifications (registry)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies existing user documents (likely ransomware behavior)
Powershell is started from unusual location (likely to bypass HIPS)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Renames powershell.exe to bypass HIPS
Sigma detected: Capture Wi-Fi password
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Uses netsh to modify the Windows network and firewall settings
Uses whoami command line tool to query computer and username
Very long command line found
Yara detected AsyncRAT
Yara detected BrowserPasswordDump
Yara detected StormKitty Stealer
Yara detected Strela Stealer
Yara detected VenomRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1301463 Sample: 1.bat Startdate: 01/09/2023 Architecture: WINDOWS Score: 100 87 Snort IDS alert for network traffic 2->87 89 Found malware configuration 2->89 91 Malicious sample detected (through community Yara rule) 2->91 93 10 other signatures 2->93 10 cmd.exe 2 2->10         started        process3 file4 65 C:\Users\user\Desktop\1.bat.exe, PE32+ 10->65 dropped 101 Uses netsh to modify the Windows network and firewall settings 10->101 103 Tries to harvest and steal WLAN passwords 10->103 105 Renames powershell.exe to bypass HIPS 10->105 14 1.bat.exe 18 154 10->14         started        19 conhost.exe 10->19         started        signatures5 process6 dnsIp7 73 163.5.215.237, 4449, 49718, 49720 EPITECHFR France 14->73 75 ip-api.com 208.95.112.1, 49727, 80 TUT-ASUS United States 14->75 77 4 other IPs or domains 14->77 67 C:\Users\user\AppData\...\MXPXCVPDVN.pdf, ASCII 14->67 dropped 69 C:\Users\user\AppData\...\SQRKHNBNYN.jpg, ASCII 14->69 dropped 71 C:\Users\user\AppData\...\SFPUSAFIOL.xlsx, ASCII 14->71 dropped 79 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->79 81 Very long command line found 14->81 83 May check the online IP address of the machine 14->83 85 7 other signatures 14->85 21 powershell.exe 2 13 14->21         started        24 cmd.exe 14->24         started        26 cmd.exe 14->26         started        file8 signatures9 process10 signatures11 95 Suspicious powershell command line found 21->95 97 Uses whoami command line tool to query computer and username 21->97 28 powershell.exe 21->28         started        31 cmd.exe 1 21->31         started        33 conhost.exe 21->33         started        43 4 other processes 21->43 99 Tries to harvest and steal WLAN passwords 24->99 35 conhost.exe 24->35         started        37 chcp.com 24->37         started        39 netsh.exe 24->39         started        41 findstr.exe 24->41         started        45 3 other processes 26->45 process12 signatures13 107 Disable Windows Defender notifications (registry) 28->107 109 Uses whoami command line tool to query computer and username 28->109 47 cmd.exe 28->47         started        49 MpCmdRun.exe 28->49         started        51 conhost.exe 28->51         started        57 4 other processes 28->57 53 MSASCuiL.exe 31->53         started        55 conhost.exe 31->55         started        process14 process15 59 conhost.exe 47->59         started        61 MSASCuiL.exe 47->61         started        63 conhost.exe 49->63         started       
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Launches sc.exe
Accesses Microsoft Outlook profiles
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments