MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e0cdcdaa9cf3c06e4f5c28a4d7878f8bd60265f2b7e9a8eb88a6f13b75435b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments 1

SHA256 hash: 3e0cdcdaa9cf3c06e4f5c28a4d7878f8bd60265f2b7e9a8eb88a6f13b75435b7
SHA3-384 hash: c732801837b882a668728e1e96e479161ea8fdad8e7d29485a3b6086b008ad11042d93aebafa8e156d62a34b44ab4489
SHA1 hash: 88a75c9383c35df71876af8f579c3ab4eddba929
MD5 hash: 6483a177ef7b0b280e5123654f6aed39
humanhash: item-vermont-uncle-dakota
File name:6483a177ef7b0b280e5123654f6aed39
Download: download sample
Signature Formbook
File size:589'824 bytes
First seen:2023-02-14 19:59:51 UTC
Last seen:2023-02-14 21:32:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:7FFZ6AQRP+1UNPnKtQNw32NmJvGwVnQEt4:d6JRPBQt8wGNqvfVQ
TLSH T17AC41251029A739BDAFCDFB259B825603338773AB951D9094D8D20EC1EA37206381BF7
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 8060e0e080204000 (7 x AgentTesla, 6 x Formbook, 3 x Loki)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Enquiry 220062 Krause K + K GmbH Armaturenfabrik.xls
Verdict:
Malicious activity
Analysis date:
2023-02-14 17:02:16 UTC
Tags:
opendir exploit cve-2017-11882 loader stealer trojan formbook

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 807615 Sample: 13FJN1HB2H.exe Startdate: 14/02/2023 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for URL or domain 2->54 56 Sigma detected: Scheduled temp file as task from temp location 2->56 58 4 other signatures 2->58 8 13FJN1HB2H.exe 7 2->8         started        12 ylqhyKcn.exe 5 2->12         started        process3 file4 38 C:\Users\user\AppData\Roaming\ylqhyKcn.exe, PE32 8->38 dropped 40 C:\Users\...\ylqhyKcn.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp6B6F.tmp, XML 8->42 dropped 44 C:\Users\user\AppData\...\13FJN1HB2H.exe.log, ASCII 8->44 dropped 68 Uses schtasks.exe or at.exe to add and modify task schedules 8->68 70 Adds a directory exclusion to Windows Defender 8->70 72 Injects a PE file into a foreign processes 8->72 14 13FJN1HB2H.exe 8->14         started        17 powershell.exe 21 8->17         started        19 schtasks.exe 1 8->19         started        74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 21 schtasks.exe 1 12->21         started        23 ylqhyKcn.exe 12->23         started        signatures5 process6 signatures7 80 Modifies the context of a thread in another process (thread injection) 14->80 82 Maps a DLL or memory area into another process 14->82 84 Sample uses process hollowing technique 14->84 86 Queues an APC in another process (thread injection) 14->86 25 explorer.exe 2 1 14->25 injected 29 conhost.exe 17->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        process8 dnsIp9 46 www.arizonafilm.org 173.255.194.134, 49721, 80 LINODE-APLinodeLLCUS United States 25->46 48 www.hayuterce.com 208.91.197.132, 49736, 80 CONFLUENCE-NETWORK-INCVG Virgin Islands (BRITISH) 25->48 50 4 other IPs or domains 25->50 78 System process connects to network (likely due to code injection or exploit) 25->78 35 cmstp.exe 13 25->35         started        signatures10 process11 signatures12 60 Tries to steal Mail credentials (via file / registry access) 35->60 62 Tries to harvest and steal browser information (history, passwords, etc) 35->62 64 Modifies the context of a thread in another process (thread injection) 35->64 66 Maps a DLL or memory area into another process 35->66
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-02-14 19:41:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Unpacked files
SH256 hash:
5cce4d18007b6fb8cf3377c795dcfebb18cc3b5dabc11b09334c8ed7191231b3
MD5 hash:
b3843c7b674a2ebaf1e0f5907c847094
SHA1 hash:
639b742aeb8fd1c34c0b90d677ac259fcd5f899a
SH256 hash:
1f95f02ddbc24d8c8a70775474b119d517971f10d652d6561075f15a4da4977e
MD5 hash:
a7564e7e28ad6559bfae40db7f3e1467
SHA1 hash:
d82ddf80dfc3a7f8967e97b2a7b889f548120a1d
SH256 hash:
46cb32256dba295b72212185d3bf29e54de9f78fe32a8e43c82288285c3bf721
MD5 hash:
453d8d23d417dacecac4ad0235d2b420
SHA1 hash:
6aaffef79f32f151aef9d5c548ac9055ea6c2f35
SH256 hash:
e1dd1598b2fe8ba071bb77405b572b96df7bde977f0f1d38a3f684e246b05f59
MD5 hash:
aab958f1e6cd3a745227ccf7e076bbce
SHA1 hash:
3663f69a67be1a15c82111c7d17dae423a0dbfc7
SH256 hash:
e386840537170219177c2bb3404f4c7bd9da1a2d53cdf2ae1e857c3b19628a29
MD5 hash:
d170ab8c03b9c37d5be449454db131d2
SHA1 hash:
2031b6754a65d21b47dd11a34fee86f048d6048d
SH256 hash:
3e0cdcdaa9cf3c06e4f5c28a4d7878f8bd60265f2b7e9a8eb88a6f13b75435b7
MD5 hash:
6483a177ef7b0b280e5123654f6aed39
SHA1 hash:
88a75c9383c35df71876af8f579c3ab4eddba929
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 3e0cdcdaa9cf3c06e4f5c28a4d7878f8bd60265f2b7e9a8eb88a6f13b75435b7

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-02-14 19:59:54 UTC

url : hxxp://103.170.254.253/spacedata/vbc.exe