MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 389f5ad5330ae27ed43bc0b3f33cd1655a49365f0310e25fd35f6771824d009e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: 389f5ad5330ae27ed43bc0b3f33cd1655a49365f0310e25fd35f6771824d009e
SHA3-384 hash: 3d9ea1b719deb46945511b54e416b075c1ac1c960e952ffb017f7eddb8be21dae2c6832b3af32f3031770e2987eb0938
SHA1 hash: 4d03caf6f164bd0265b352b712710f904bfa4d0c
MD5 hash: cd8e4b26786de8102562837b9915e0c3
humanhash: mississippi-uniform-steak-snake
File name:SecuriteInfo.com.Trojan.GenericKD.50659148.2253.26963
Download: download sample
Signature Formbook
File size:536'064 bytes
First seen:2022-07-19 04:40:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:4BCbU8Xu06OK0kWpunXbBlYfbAii6hPYHl6+0xCdgd5Oq5yimLCb2RDnFo9dRUSv:43I6qk7HOkchwHUDHd5W1/TS9dRVv
TLSH T100B4BD3A6D37A150FEFCC135BDD073A041247ABEEDDA0F86E458B6CA32A72D14271562
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 66c29abaaaaaaa86 (20 x AgentTesla, 10 x Formbook, 7 x SnakeKeylogger)
Reporter SecuriteInfoCom
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a file
Searching for synchronization primitives
Сreating synchronization primitives
Launching cmd.exe command interpreter
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected Costura Assembly Loader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 668748 Sample: SecuriteInfo.com.Trojan.Gen... Startdate: 19/07/2022 Architecture: WINDOWS Score: 100 35 Malicious sample detected (through community Yara rule) 2->35 37 Antivirus detection for URL or domain 2->37 39 Antivirus / Scanner detection for submitted sample 2->39 41 9 other signatures 2->41 10 SecuriteInfo.com.Trojan.GenericKD.50659148.2253.exe 3 2->10         started        process3 file4 29 SecuriteInfo.com.T...659148.2253.exe.log, ASCII 10->29 dropped 13 InstallUtil.exe 10->13         started        16 InstallUtil.exe 10->16         started        process5 signatures6 51 Modifies the context of a thread in another process (thread injection) 13->51 53 Maps a DLL or memory area into another process 13->53 55 Sample uses process hollowing technique 13->55 57 Queues an APC in another process (thread injection) 13->57 18 explorer.exe 13->18 injected 59 Tries to detect virtualization through RDTSC time measurements 16->59 process7 dnsIp8 31 themesskits.com 160.153.136.3, 49858, 80 GODADDY-AMSDE United States 18->31 33 www.themesskits.com 18->33 43 System process connects to network (likely due to code injection or exploit) 18->43 22 svchost.exe 18->22         started        signatures9 process10 signatures11 45 Modifies the context of a thread in another process (thread injection) 22->45 47 Maps a DLL or memory area into another process 22->47 49 Tries to detect virtualization through RDTSC time measurements 22->49 25 cmd.exe 1 22->25         started        process12 process13 27 conhost.exe 25->27         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-07-19 04:41:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:ja25 rat spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
76552c485a7386fb0fcbcc80d67cb1e53a9cdc0bce1c73a8983bf71b1a9ced22
MD5 hash:
f66db51f1bc802b2f02dcb011e2c8152
SHA1 hash:
a032d33597e53df169a1cc7d631973ea92660fae
Detections:
win_formbook_g0 win_formbook_auto FormBook
SH256 hash:
d0ad663ff999fa7bf7dd67b5ed5da7782796aefd4d18324597a030ee2ce740ff
MD5 hash:
cf1b44568d6d756d37a302b8938a9655
SHA1 hash:
5339f910550151ce427d5c5c688ee98d1b3d4cf2
Detections:
win_formbook_g0
SH256 hash:
9f01d9f2ed07e630ec078efa5d760762c3c8ad3b06e9e8a9062a37d63d57b026
MD5 hash:
9fbb8cec55b2115c00c0ba386c37ce62
SHA1 hash:
e2378a1c22c35e40fd1c3e19066de4e33b50f24a
SH256 hash:
e4e443f06d40dcc47056b1efecdacab70be3b4c2b0cd485f48094ab752d5ccc0
MD5 hash:
63ac3f69c8272189ef4d2721356c20c0
SHA1 hash:
8e8b7488e70a3120975d5ae2fea381ca6ae78413
SH256 hash:
e64b70f3d1af832dbb22e0649be04a7f2a18ecb8427ff53de78c73a17ce761a6
MD5 hash:
1fab992d5411891e8b2e06c812239ce5
SHA1 hash:
7efd925c5bf8c26ec8c15e671a637ae4364a61a4
SH256 hash:
389f5ad5330ae27ed43bc0b3f33cd1655a49365f0310e25fd35f6771824d009e
MD5 hash:
cd8e4b26786de8102562837b9915e0c3
SHA1 hash:
4d03caf6f164bd0265b352b712710f904bfa4d0c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:malware_Formbook_strings
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments