MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 35cff2b48d10ff7ed2cafae09a39e95b0c09dcab5a152377df6b0e361f4ba729. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | 35cff2b48d10ff7ed2cafae09a39e95b0c09dcab5a152377df6b0e361f4ba729 |
|---|---|
| SHA3-384 hash: | 9684c3150eef71630940743561f76af0a9ce242fede419fe203b4c1bc9f882e9e691a77cfe7bac63f1132051857559ef |
| SHA1 hash: | efc4204b35de07d8b13157b8d4c62680537cebc8 |
| MD5 hash: | 1160a63aa2dc3b1803ce0de25eceb038 |
| humanhash: | nuts-beer-jersey-green |
| File name: | MV ALIADO-S-REQ-19-000640.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'183'232 bytes |
| First seen: | 2024-09-09 11:30:36 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT) |
| ssdeep | 24576:bAHnh+eWsN3skA4RV1Hom2KXMmHa6WuDN4vXWYYf7a+5:2h+ZkldoPK8Ya6Bo0D |
| Threatray | 566 similar samples on MalwareBazaar |
| TLSH | T14445BE0273D1C036FFABA2739B6AB60556BD78254133852F13981DB9BD701B2273E663 |
| TrID | 63.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 11.6% (.EXE) Win64 Executable (generic) (10523/12/4) 7.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 5.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.9% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
398
Origin country :
HUVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
MV ALIADO-S-REQ-19-000640.exe
Verdict:
No threats detected
Analysis date:
2024-09-09 11:46:00 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
99.9%
Tags:
Malware
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Сreating synchronization primitives
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin microsoft_visual_cc packed shell32
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2024-09-06 09:25:29 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
20 of 24 (83.33%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 556 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
5/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
84474ef811f5dc891d84a950b16365b115d4d4a7ca5d334893c3863352ab6773
MD5 hash:
fa5f2ec16a0cbf04a205f3d5c5d3f63d
SHA1 hash:
2a2cb560bc01a88aa3137cceabda940ddbe5ab6b
Detections:
win_formbook_g0
win_formbook_w0
Parent samples :
35aad958ea02458da32208308f06b03c43d414108eb36ecb9f030df395797711
768f1a94f4b80877f6a962788166200a3802ff6804a4c54fc5da20f146c638d3
80c3f08414c52ad750849be7de33ba13fdf4eed3e5f6b02c6badf6ef1e2813da
61a61995b261498497d260f7bfe117e51dfd2a79f4fac02a569f542643d48a75
0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56
32c5693d76faf5f4ba9b8207fe6111791a77f7120afa56007c2b9b0e96e809e5
cd31107042d359420d18f748d7b01071e55ddbda69684fb0b06c27d751178268
e4bb9e9c641c900561991085331edaf5914825435d8e5a1eeff571227d22f7c4
8c93a7310543718620f4ccd70e8bcaf1764cf48c16ddf43ed9ae3e79d6b61e0a
67590c1c2e02e4d21fdf610ad1284734229d95327d3903dc57322f3ce1d00dfd
bcd8cf884d4900e611c0c2db06818a26b626aa50acfa4845f47a4228057aa1c2
35cff2b48d10ff7ed2cafae09a39e95b0c09dcab5a152377df6b0e361f4ba729
a65417bb26c953b74d02dae93127b44db0327f6170f151e2122ef671beb2e717
0c7dba4a1931d61ade581c4414cddea64948bcd740b4db9526a70bf6281b9e80
66f8c1cba3ad6b3362dcfc5f59861c2505b2ea55fe8d261562506889983a324d
768f1a94f4b80877f6a962788166200a3802ff6804a4c54fc5da20f146c638d3
80c3f08414c52ad750849be7de33ba13fdf4eed3e5f6b02c6badf6ef1e2813da
61a61995b261498497d260f7bfe117e51dfd2a79f4fac02a569f542643d48a75
0c5c3f606d4a78f0504cf025f5b2d27b7693d217d2c4e004b348d84ca770df56
32c5693d76faf5f4ba9b8207fe6111791a77f7120afa56007c2b9b0e96e809e5
cd31107042d359420d18f748d7b01071e55ddbda69684fb0b06c27d751178268
e4bb9e9c641c900561991085331edaf5914825435d8e5a1eeff571227d22f7c4
8c93a7310543718620f4ccd70e8bcaf1764cf48c16ddf43ed9ae3e79d6b61e0a
67590c1c2e02e4d21fdf610ad1284734229d95327d3903dc57322f3ce1d00dfd
bcd8cf884d4900e611c0c2db06818a26b626aa50acfa4845f47a4228057aa1c2
35cff2b48d10ff7ed2cafae09a39e95b0c09dcab5a152377df6b0e361f4ba729
a65417bb26c953b74d02dae93127b44db0327f6170f151e2122ef671beb2e717
0c7dba4a1931d61ade581c4414cddea64948bcd740b4db9526a70bf6281b9e80
66f8c1cba3ad6b3362dcfc5f59861c2505b2ea55fe8d261562506889983a324d
SH256 hash:
3e4d284431e671b6407ea86a3806895a05b38438a4a909ad91589e03a648d450
MD5 hash:
44871f725ac22250797fa7913051db11
SHA1 hash:
89198f3b2e1788af9c3f5b959609c1a42ba7b162
SH256 hash:
35cff2b48d10ff7ed2cafae09a39e95b0c09dcab5a152377df6b0e361f4ba729
MD5 hash:
1160a63aa2dc3b1803ce0de25eceb038
SHA1 hash:
efc4204b35de07d8b13157b8d4c62680537cebc8
Detections:
AutoIT_Compiled
SUSP_Imphash_Mar23_3
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Formbook
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.