MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2c67cd53627199ab4741a3fe73a317b1f91fd46544e06ed251b8ab8b444170a8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | 2c67cd53627199ab4741a3fe73a317b1f91fd46544e06ed251b8ab8b444170a8 |
|---|---|
| SHA3-384 hash: | 2943f60fc872ac26ac0175d3d6c302f0e9c31d32ad2eb4a87ae1937de218f9e9ae38c7153c5865fafe767558311b7312 |
| SHA1 hash: | 9901d14b05a9e8305a4660ead1a334571f7017fe |
| MD5 hash: | bab35b6fe111a241883bdbd3f9996a30 |
| humanhash: | white-crazy-freddie-berlin |
| File name: | Inquiry 241128.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 918'016 bytes |
| First seen: | 2024-11-28 08:15:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'660 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 24576:k2xj0BZodxnaB89JG0Z7dFXue45xMP9LCnYnL:H+BZ0hBG0Z7+eOOPAnY |
| Threatray | 1'014 similar samples on MalwareBazaar |
| TLSH | T1D81512A422DFE906C8E217704972E3F44A749DC8ED15C30B5BE97EEFF8362562990391 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0048496961686800 (5 x Formbook, 2 x RemcosRAT, 1 x Loki) |
| Reporter | Anonymous |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
418
Origin country :
PLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Inquiry 241128.exe
Verdict:
No threats detected
Analysis date:
2024-11-28 08:42:19 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
virus micro msil
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected vbnet
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Malware family:
Agent Tesla
Verdict:
Malicious
Result
Threat name:
FormBook, PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected FormBook
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2024-11-28 03:44:54 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
19 of 24 (79.17%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
unknown_loader_037
Similar samples:
+ 1'004 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
discovery execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
57eae970c958ede9aa453b0384b5440ad520cf3957d217aa914aed436c437e53
MD5 hash:
e4902b7f3836b5f14e117f1f5d35b6ea
SHA1 hash:
55bd0d8570400fead5b4fdd0d39cbd5c70b1b7fd
SH256 hash:
7959a9b2ea6bba1b4330b72a4c6fa90c075a5b21ea471ccb65680ba248261be8
MD5 hash:
13b4f69ee3e3657fbe3c0d245f5820ca
SHA1 hash:
3ff41501d3594a35a9b8c39469bb3f6f86c3d319
SH256 hash:
e336c22a135249eb2d3c1b238b24dce6b3caceee46ed2c528ac3bc4d0db5466b
MD5 hash:
5acc21a9b9bf336c0fe056d96e26c8da
SHA1 hash:
1fc74ff9fae303c5cad68becc9a2a050a5570c73
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
67dcf18fdd4c10ffb663147b020f3ad61318901788b549b9ed9f3e1048d0aa73
MD5 hash:
a6377ea44fc38dd0821b260a6b2ef2a7
SHA1 hash:
000a27dbb56df395033adf78ef97339d2f001178
SH256 hash:
2c67cd53627199ab4741a3fe73a317b1f91fd46544e06ed251b8ab8b444170a8
MD5 hash:
bab35b6fe111a241883bdbd3f9996a30
SHA1 hash:
9901d14b05a9e8305a4660ead1a334571f7017fe
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.