MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3064359bd46de9cf0fd21817bc5a904aa1da5a262568fe701d58ba39c4e9a40f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 3064359bd46de9cf0fd21817bc5a904aa1da5a262568fe701d58ba39c4e9a40f
SHA3-384 hash: 8cc91e444784c4d6f6630ad254ed1016075db84ab7f66ab31c5610776aad81a4db22106c7572216b5ddd3870ee1221f6
SHA1 hash: ee8ce8321e24045ffb114bcf61b3be8e5f25cc48
MD5 hash: cfa14ce8365b677068f4ee89a4a74d75
humanhash: ink-video-shade-equal
File name:kMXEkP04ZesB76R.exe
Download: download sample
Signature Formbook
File size:852'480 bytes
First seen:2025-03-26 07:19:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:x91y8Vuik9V+mEJnlVyQl2ViURQ2aApL+mz:xWqCOZjlK0dAxR
Threatray 6 similar samples on MalwareBazaar
TLSH T1B405013D7D768E31C3584FF7C456604982B6CB62D477F7AA08CD2CF00E62659C8DAA92
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 16e8c8e8e8c8e812 (10 x SnakeKeylogger, 9 x Formbook, 6 x MassLogger)
Reporter Anonymous
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
471
Origin country :
PL PL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
kMXEkP04ZesB76R.exe
Verdict:
Suspicious activity
Analysis date:
2025-03-26 07:44:43 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
micro spawn shell
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated obfuscated packed packed packer_detected vbnet
Verdict:
Malicious
Labled as:
HackTool[Obfuscator]/MSIL.DeepSea
Result
Verdict:
MALICIOUS
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1648818 Sample: kMXEkP04ZesB76R.exe Startdate: 26/03/2025 Architecture: WINDOWS Score: 100 66 www.whalegamefi.xyz 2->66 68 www.tropicus.xyz 2->68 70 14 other IPs or domains 2->70 80 Suricata IDS alerts for network traffic 2->80 82 Antivirus detection for URL or domain 2->82 84 Antivirus / Scanner detection for submitted sample 2->84 88 7 other signatures 2->88 10 kMXEkP04ZesB76R.exe 7 2->10         started        14 ChAxqeruf.exe 5 2->14         started        16 svchost.exe 1 1 2->16         started        signatures3 86 Performs DNS queries to domains with low reputation 68->86 process4 dnsIp5 56 C:\Users\user\AppData\Roaming\ChAxqeruf.exe, PE32 10->56 dropped 58 C:\Users\...\ChAxqeruf.exe:Zone.Identifier, ASCII 10->58 dropped 60 C:\Users\user\AppData\Local\...\tmpE99A.tmp, XML 10->60 dropped 62 C:\Users\user\...\kMXEkP04ZesB76R.exe.log, ASCII 10->62 dropped 96 Uses schtasks.exe or at.exe to add and modify task schedules 10->96 98 Adds a directory exclusion to Windows Defender 10->98 100 Injects a PE file into a foreign processes 10->100 19 kMXEkP04ZesB76R.exe 10->19         started        22 powershell.exe 23 10->22         started        24 powershell.exe 23 10->24         started        26 schtasks.exe 1 10->26         started        102 Antivirus detection for dropped file 14->102 104 Multi AV Scanner detection for dropped file 14->104 28 schtasks.exe 14->28         started        30 ChAxqeruf.exe 14->30         started        32 ChAxqeruf.exe 14->32         started        64 127.0.0.1 unknown unknown 16->64 file6 signatures7 process8 signatures9 90 Maps a DLL or memory area into another process 19->90 34 o814bs81AlYg300TKDDijzl.exe 19->34 injected 92 Loading BitLocker PowerShell Module 22->92 37 conhost.exe 22->37         started        39 WmiPrvSE.exe 22->39         started        41 conhost.exe 24->41         started        43 conhost.exe 26->43         started        45 conhost.exe 28->45         started        process10 signatures11 78 Found direct / indirect Syscall (likely to bypass EDR) 34->78 47 RMActivate_ssp_isv.exe 34->47         started        process12 signatures13 106 Tries to steal Mail credentials (via file / registry access) 47->106 108 Tries to harvest and steal browser information (history, passwords, etc) 47->108 110 Modifies the context of a thread in another process (thread injection) 47->110 112 3 other signatures 47->112 50 o814bs81AlYg300TKDDijzl.exe 47->50 injected 54 firefox.exe 47->54         started        process14 dnsIp15 72 51-clubb.net 208.109.172.233, 49733, 49734, 49735 GO-DADDY-COM-LLCUS United States 50->72 74 www.flashselectionhub.shop 162.210.195.105, 49773, 49774, 49775 LEASEWEB-USA-WDCUS United States 50->74 76 9 other IPs or domains 50->76 94 Found direct / indirect Syscall (likely to bypass EDR) 50->94 signatures16
Threat name:
Win32.Backdoor.FormBook
Status:
Malicious
First seen:
2025-03-26 07:19:18 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
3064359bd46de9cf0fd21817bc5a904aa1da5a262568fe701d58ba39c4e9a40f
MD5 hash:
cfa14ce8365b677068f4ee89a4a74d75
SHA1 hash:
ee8ce8321e24045ffb114bcf61b3be8e5f25cc48
SH256 hash:
c7da900c6a11ee75c94c6285415a89e012da8ba1c75bfe60a893c20b89db3129
MD5 hash:
de3d74ed1375f59d1bde57a73a9ab29f
SHA1 hash:
360ad54b43cce6e5948fb9478b31b2a658bea04e
SH256 hash:
900339cbb4bacc9ad51a9f164fa61c13eabee57f97d1ff1d5c395a7d454499de
MD5 hash:
b8fd469eb641b9821d27022396252726
SHA1 hash:
79c6ed730edffa88c948b7b342d7641259435eb1
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
0723cd2e1012aa9b03bb31dfda2adcd2a2c9738f7dae21399f5b71272ebdf3f3
MD5 hash:
7c131bb60e9afbb7d8fb16cc6b5b18a4
SHA1 hash:
a9be095cdef518c2ba18aa2e0e95b3b781f24acd
SH256 hash:
bdb7263ad3223671296c9b384d924f10409d60fd4326e0fcae2d2d74ff03ae87
MD5 hash:
f60af94ffcc6ca1fb4053c34c5525d29
SHA1 hash:
0c048b03d0e3c245cd0fe055c1cb7b6f9ef735cc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments