MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3a62728317a01630a7be9167c9223d451bff0384568482468a9d195a5679f533. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 3a62728317a01630a7be9167c9223d451bff0384568482468a9d195a5679f533
SHA3-384 hash: 50240b7ece6af30c360cc65f5e9ae2b2c25a8b068a08e8e1ad4f59c2879a08d91d840f99b57fa988ce4db7966a36d4a5
SHA1 hash: 8cea520ebd44574c8cd69ce84eb845bec973de8e
MD5 hash: f1352de6f18f20026a4accd55522324e
humanhash: east-london-lake-rugby
File name:f1352de6f18f20026a4accd55522324e
Download: download sample
Signature Formbook
File size:921'088 bytes
First seen:2022-04-11 18:50:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3f80d1f9d9f013af2a55533ae8960c8c (5 x Formbook, 2 x DBatLoader, 2 x RemcosRAT)
ssdeep 24576:niZakGXsru5PAKhEqmlydutZUoEtdPgGb:niWcWfPgG
TLSH T15F159E11B2914A37D43B0A788C5B97B59837BF432E187B973BE41D4D3E796813C2A293
File icon (PE):PE icon
dhash icon 0c321272b98ca6d9 (12 x Formbook, 7 x RemcosRAT, 5 x DBatLoader)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
296
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
f1352de6f18f20026a4accd55522324e
Verdict:
Malicious activity
Analysis date:
2022-04-11 21:41:09 UTC
Tags:
trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the process to interact with network services
Launching a process
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Searching for synchronization primitives
Creating a file in the %temp% directory
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe keylogger remcos shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected FormBook malware
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 607349 Sample: pybnR1hPZH Startdate: 11/04/2022 Architecture: WINDOWS Score: 100 55 www.gecisaze.com 2->55 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Multi AV Scanner detection for submitted file 2->75 77 5 other signatures 2->77 11 pybnR1hPZH.exe 1 20 2->11         started        signatures3 process4 dnsIp5 57 cutting-tools.in 162.215.240.160, 443, 49732, 49733 PUBLIC-DOMAIN-REGISTRYUS United States 11->57 49 C:\Users\Public\Libraries49qkltcl.exe, PE32 11->49 dropped 109 Writes to foreign memory regions 11->109 111 Creates a thread in another existing process (thread injection) 11->111 113 Injects a PE file into a foreign processes 11->113 16 logagent.exe 11->16         started        19 cmd.exe 1 11->19         started        file6 signatures7 process8 signatures9 63 Modifies the context of a thread in another process (thread injection) 16->63 65 Maps a DLL or memory area into another process 16->65 67 Sample uses process hollowing technique 16->67 69 2 other signatures 16->69 21 explorer.exe 2 16->21 injected 23 cmd.exe 1 19->23         started        25 conhost.exe 19->25         started        process10 process11 27 Nqkltcl.exe 13 21->27         started        31 msiexec.exe 18 21->31         started        34 Nqkltcl.exe 14 21->34         started        38 2 other processes 21->38 36 conhost.exe 23->36         started        dnsIp12 59 cutting-tools.in 27->59 89 Multi AV Scanner detection for dropped file 27->89 91 Writes to foreign memory regions 27->91 93 Allocates memory in foreign processes 27->93 40 DpiScaling.exe 27->40         started        51 C:\Users\user\AppData\...\40Rlogrv.ini, data 31->51 dropped 53 C:\Users\user\AppData\...\40Rlogri.ini, data 31->53 dropped 95 Detected FormBook malware 31->95 97 Tries to steal Mail credentials (via file / registry access) 31->97 99 Tries to harvest and steal browser information (history, passwords, etc) 31->99 107 2 other signatures 31->107 43 cmd.exe 2 31->43         started        61 cutting-tools.in 34->61 101 Creates a thread in another existing process (thread injection) 34->101 103 Injects a PE file into a foreign processes 34->103 45 logagent.exe 34->45         started        105 Tries to detect virtualization through RDTSC time measurements 38->105 file13 signatures14 process15 signatures16 79 Modifies the context of a thread in another process (thread injection) 40->79 81 Maps a DLL or memory area into another process 40->81 83 Sample uses process hollowing technique 40->83 85 Tries to detect virtualization through RDTSC time measurements 40->85 87 Tries to harvest and steal browser information (history, passwords, etc) 43->87 47 conhost.exe 43->47         started        process17
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-04-11 15:25:23 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
53ac01aeca155b02914c382b97c6f89cf21d6280f488a30eca707bdb9693ce88
MD5 hash:
c755150a74c084c199d24042e9796f35
SHA1 hash:
0fea1a6ae181215deb872c5bb4d2f9ee242f3319
Detections:
win_dbatloader_w0
SH256 hash:
3a62728317a01630a7be9167c9223d451bff0384568482468a9d195a5679f533
MD5 hash:
f1352de6f18f20026a4accd55522324e
SHA1 hash:
8cea520ebd44574c8cd69ce84eb845bec973de8e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 3a62728317a01630a7be9167c9223d451bff0384568482468a9d195a5679f533

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-04-11 18:50:18 UTC

url : hxxp://179.43.175.179/olmi/Nqkltclavokrxwomfteerxhhioypkgwtcf.exe