MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 37d591fc9cbb5d1880fa42ec39099bb85d6d98d367657a464d55bec146de1385. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: 37d591fc9cbb5d1880fa42ec39099bb85d6d98d367657a464d55bec146de1385
SHA3-384 hash: b95b29be55190d72688a6c937348b91e90abc6c169c9fe1c772f48dd1b105eee4891d6590fb8f0833bc6c4bb36723f7f
SHA1 hash: bc13bfa2277ef959d6d86841b5d18b0c9595e8b1
MD5 hash: 948d139bfb4861e870504a095cc19e7b
humanhash: victor-sink-finch-jersey
File name:orA5ALUAmWVn51g.exe
Download: download sample
Signature Formbook
File size:703'488 bytes
First seen:2024-10-10 16:23:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'747 x AgentTesla, 19'638 x Formbook, 12'244 x SnakeKeylogger)
ssdeep 12288:t7jgjbquQJrkkNk6vwyVdDOOOA82HzwIFFuOWkdBu2paTbcgsGPWqp4l:hgkdIyVdlO1UwEuOWkvue4bdI04l
Threatray 4'198 similar samples on MalwareBazaar
TLSH T1FDE412E6151AE932C9B203B10031D7BB0B7A7D8DF422E31B5AEDDCD376067A87994391
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
File icon (PE):PE icon
dhash icon 1ee5e39be66238a0 (9 x Formbook, 3 x MassLogger, 2 x SnakeKeylogger)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
398
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
orA5ALUAmWVn51g.exe
Verdict:
No threats detected
Analysis date:
2024-10-10 16:53:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1530975 Sample: orA5ALUAmWVn51g.exe Startdate: 10/10/2024 Architecture: WINDOWS Score: 100 31 www.aismart-contractor.xyz 2->31 33 www.zhongzhuankk389.sbs 2->33 35 9 other IPs or domains 2->35 45 Suricata IDS alerts for network traffic 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for submitted file 2->49 53 5 other signatures 2->53 10 orA5ALUAmWVn51g.exe 3 2->10         started        signatures3 51 Performs DNS queries to domains with low reputation 31->51 process4 file5 29 C:\Users\user\...\orA5ALUAmWVn51g.exe.log, ASCII 10->29 dropped 65 Injects a PE file into a foreign processes 10->65 14 orA5ALUAmWVn51g.exe 10->14         started        signatures6 process7 signatures8 67 Maps a DLL or memory area into another process 14->67 17 RckKhRmXhY.exe 14->17 injected process9 signatures10 43 Found direct / indirect Syscall (likely to bypass EDR) 17->43 20 cleanmgr.exe 13 17->20         started        process11 signatures12 55 Tries to steal Mail credentials (via file / registry access) 20->55 57 Tries to harvest and steal browser information (history, passwords, etc) 20->57 59 Modifies the context of a thread in another process (thread injection) 20->59 61 3 other signatures 20->61 23 RckKhRmXhY.exe 20->23 injected 27 firefox.exe 20->27         started        process13 dnsIp14 37 fourier.tech 15.197.204.56, 52896, 52897, 52898 TANDEMUS United States 23->37 39 blind4aday.life 84.32.84.32, 52884, 52885, 52886 NTT-LT-ASLT Lithuania 23->39 41 5 other IPs or domains 23->41 63 Found direct / indirect Syscall (likely to bypass EDR) 23->63 signatures15
Threat name:
Win32.Trojan.SnakeLogger
Status:
Malicious
First seen:
2024-10-10 16:24:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
a42e17bea076098f078a454484275534e4ecd93eb339326d88a6fbf6c9427327
MD5 hash:
c34e995a219cb8b309b7116bb752616b
SHA1 hash:
1cb496143b2f3b1b95e282144b952ce951db3e36
Detections:
win_formbook_g0 win_formbook_w0 Windows_Trojan_Formbook
SH256 hash:
1dff06715a3058f489d8e328808c5476481ec23b7bcbc6166bf86d96515cb592
MD5 hash:
c66afc354330d2e2c0a54eac06b20171
SHA1 hash:
99b5ee9ffdf0f390c8e849969caa8b12a505e0a5
SH256 hash:
1ef0690d3337b9595e42c304e6e6f24a42caa372d9ac947ed93ab6f702af2ba3
MD5 hash:
1bc29f6f48452732a39e96c0f2c8d8ac
SHA1 hash:
1f45831490afdf340a573f7fe36302d860959652
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
37d591fc9cbb5d1880fa42ec39099bb85d6d98d367657a464d55bec146de1385
MD5 hash:
948d139bfb4861e870504a095cc19e7b
SHA1 hash:
bc13bfa2277ef959d6d86841b5d18b0c9595e8b1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 37d591fc9cbb5d1880fa42ec39099bb85d6d98d367657a464d55bec146de1385

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments