MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3cb35987211d9d3cb9ca2e159aed920cf19d8bc5e0695ef9837abe0454312ee4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 3cb35987211d9d3cb9ca2e159aed920cf19d8bc5e0695ef9837abe0454312ee4
SHA3-384 hash: 3790297589ef08f586f1abfe872ad6cbd7481ab76320fc3f21da235376f1ac2f264cba456e51a1be3a8763e1b8e1b3aa
SHA1 hash: b038b98cafc9e40e1312509db8fdc7cfa83a1f4f
MD5 hash: cfda7f1240ac98dafed7d29196727dbe
humanhash: social-october-aspen-vermont
File name:greatnamechangedwithgoodnews.hta
Download: download sample
Signature Formbook
File size:16'033 bytes
First seen:2025-02-07 05:36:04 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 48:3viiLLhL8GLLlwlL8KGE0n+Pepeb299DdZdIMcXDPzLLD+LLgpJV/L8ADLLrOPG:fiihIGkIK307Ab2fPd1cXfC4IqK+
TLSH T1DF7270061D95DD8E1F84297065CC4AC0473E9B3E488A2702714FDE6A47C26B4ECCEE93
Magika txt
Reporter abuse_ch
Tags:FormBook hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
obfuscate shell sage
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://198.12.81.151/680/csee.exe
HTA File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell
Result
Verdict:
MALICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
Cobalt Strike, FormBook
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Detected Cobalt Strike Beacon
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious MSHTA Child Process
Suricata IDS alerts for network traffic
Suspicious command line found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected FormBook
Yara detected Powershell decode and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1608982 Sample: greatnamechangedwithgoodnews.hta Startdate: 07/02/2025 Architecture: WINDOWS Score: 100 59 www.shibfestival.xyz 2->59 61 www.promutuus.xyz 2->61 63 15 other IPs or domains 2->63 73 Suricata IDS alerts for network traffic 2->73 75 Antivirus detection for URL or domain 2->75 77 Multi AV Scanner detection for dropped file 2->77 81 9 other signatures 2->81 13 mshta.exe 1 2->13         started        16 svchost.exe 1 1 2->16         started        signatures3 79 Performs DNS queries to domains with low reputation 61->79 process4 dnsIp5 105 Suspicious command line found 13->105 107 PowerShell case anomaly found 13->107 19 cmd.exe 1 13->19         started        57 127.0.0.1 unknown unknown 16->57 signatures6 process7 signatures8 83 Detected Cobalt Strike Beacon 19->83 85 Suspicious powershell command line found 19->85 87 PowerShell case anomaly found 19->87 22 powershell.exe 45 19->22         started        27 conhost.exe 19->27         started        process9 dnsIp10 65 198.12.81.151, 49699, 80 AS-COLOCROSSINGUS United States 22->65 51 C:\Users\user\AppData\Roaming\csee.exe, PE32 22->51 dropped 53 C:\Users\user\AppData\Local\...\csee[1].exe, PE32 22->53 dropped 55 C:\Users\user\AppData\...\em3dcskf.cmdline, Unicode 22->55 dropped 91 Loading BitLocker PowerShell Module 22->91 93 Powershell drops PE file 22->93 29 csee.exe 3 22->29         started        32 csc.exe 3 22->32         started        file11 signatures12 process13 file14 109 Multi AV Scanner detection for dropped file 29->109 111 Machine Learning detection for dropped file 29->111 113 Injects a PE file into a foreign processes 29->113 35 csee.exe 29->35         started        49 C:\Users\user\AppData\Local\...\em3dcskf.dll, PE32 32->49 dropped 38 cvtres.exe 1 32->38         started        signatures15 process16 signatures17 89 Maps a DLL or memory area into another process 35->89 40 T0f9ZVHLOdhjXEXt3I.exe 35->40 injected process18 dnsIp19 67 birbacher.online 217.160.0.24, 50024, 50025, 50026 ONEANDONE-ASBrauerstrasse48DE Germany 40->67 69 sparkletime.cloud 92.60.36.190, 49984, 49985, 49986 NETCUP-ASnetcupGmbHDE Germany 40->69 71 8 other IPs or domains 40->71 95 Found direct / indirect Syscall (likely to bypass EDR) 40->95 44 SearchProtocolHost.exe 13 40->44         started        signatures20 process21 signatures22 97 Tries to steal Mail credentials (via file / registry access) 44->97 99 Tries to harvest and steal browser information (history, passwords, etc) 44->99 101 Modifies the context of a thread in another process (thread injection) 44->101 103 2 other signatures 44->103 47 firefox.exe 44->47         started        process23
Threat name:
Script-WScript.Trojan.Remcos
Status:
Malicious
First seen:
2025-02-06 16:10:04 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
defense_evasion discovery execution
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Evasion via Device Credential Deployment
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

HTML Application (hta) hta 3cb35987211d9d3cb9ca2e159aed920cf19d8bc5e0695ef9837abe0454312ee4

(this sample)

  
Delivery method
Distributed via web download

Comments