MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2ea94454b1acb888df318792b9a81e621b95e54619d3306a4a11e26148fb3fe3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | 2ea94454b1acb888df318792b9a81e621b95e54619d3306a4a11e26148fb3fe3 |
|---|---|
| SHA3-384 hash: | d605cf949cad964d2f7486a2db47679968951cd4f2776381e07fc01e49b2da86089d53483d2d91bb121f8a72c1a1e328 |
| SHA1 hash: | 6162299a606c4ed6449ae8db8c872db81999f9e9 |
| MD5 hash: | d3a103b0ea9ff42f7fba597b1b42287b |
| humanhash: | robert-music-rugby-quiet |
| File name: | SecuriteInfo.com.W32.MSIL_Kryptik.DWR.gen.Eldorado.11372.26670 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 598'016 bytes |
| First seen: | 2023-08-30 13:40:44 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:1O6ULrAhKbW4TvzithdEqJ+WvH/RvqbIVeJ7iED02kQlEoQ:0LrNbB7WLEqk4HpSbIVTEDjRJQ |
| Threatray | 3'592 similar samples on MalwareBazaar |
| TLSH | T16ED4123132BCAC37CEBE06FC509301501BF5492A66FAE7DC1CD960EE5AE5BD85948683 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 30e8c89696aaaa96 (5 x Formbook, 5 x AgentTesla, 1 x SnakeKeylogger) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
cc3282f638a0bf6f5d3246310825760861f1ad6a78e3146c47c3e454e594c909
85e06fedb8cdd8ea049ec9b62d480e58e55356953fc02694863c916d204f5614
cda350f17f9da84bd3c76f325656630c4724eeaa08949d9d99941859bf8f0315
bee949c5192f46467c2fb76490dd2407f4206639c2e5e824c74e879c02fcc342
f72a8d106b976bd572e54e14f09ac3faed9c776395680f5689e412e62239409f
6695e4331e8ce9706466a68a03272ca2e09fa21141d08fede561a93eb8962c9f
096919dfc9600c9942e5ae37ac5526c85ffde3d38c7d000eb01d2d0ded514bbb
0192232934b2f9ae2a37ac4c8188f70804acd4c6718c95a47710f49e2f9ae9b1
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | maldoc_getEIP_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_Formbook |
|---|---|
| Author: | @malgamy12 |
| Rule name: | Windows_Trojan_Formbook_1112e116 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_formbook_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.formbook. |
| Rule name: | win_formbook_w0 |
|---|---|
| Author: | @malgamy12 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.