MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f3052e88b171781ce50abc7cb82a70bc880735f7f3a39e9c75ed93aa4dac24b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 7 File information Comments

SHA256 hash: 3f3052e88b171781ce50abc7cb82a70bc880735f7f3a39e9c75ed93aa4dac24b
SHA3-384 hash: 930335851fe5b1151c5165c2f6a04d1b5a181a83d5b78391ac26cd8f659b141c21b9262441155efd8d235c69d494e96b
SHA1 hash: 158b1676085cdb552e5eb5b20f4d7dadd894b7aa
MD5 hash: 62fb43ef2f711c276cfdecc790335fe9
humanhash: salami-blossom-washington-mississippi
File name:AWB_NO_907853880911.exe
Download: download sample
Signature Formbook
File size:1'223'680 bytes
First seen:2024-06-19 11:18:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash afcdf79be1557326c854b6e20cb900a7 (1'102 x FormBook, 936 x AgentTesla, 399 x RemcosRAT)
ssdeep 24576:2AHnh+eWsN3skA4RV1Hom2KXMmHaYeGOQjn75sIznePyJ70gFL5:Rh+ZkldoPK8YaYeRcn72agu0W
Threatray 162 similar samples on MalwareBazaar
TLSH T1CE45BE0273D2C036FFAB92739B6AF64156BD7D250123852F13981DB9BD701B2263E663
TrID 63.7% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
11.6% (.EXE) Win64 Executable (generic) (10523/12/4)
7.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
5.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.9% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter TeamDreier
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
323
Origin country :
DK DK
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3f3052e88b171781ce50abc7cb82a70bc880735f7f3a39e9c75ed93aa4dac24b.exe
Verdict:
No threats detected
Analysis date:
2024-06-19 11:30:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Сreating synchronization primitives
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin microsoft_visual_cc packed redcap shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Snort IDS alert for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1459452 Sample: AWB_NO_907853880911.exe Startdate: 19/06/2024 Architecture: WINDOWS Score: 100 48 www.heolty.xyz 2->48 50 www.zonenail.info 2->50 52 30 other IPs or domains 2->52 78 Snort IDS alert for network traffic 2->78 80 Malicious sample detected (through community Yara rule) 2->80 82 Antivirus detection for URL or domain 2->82 86 11 other signatures 2->86 12 AWB_NO_907853880911.exe 4 2->12         started        signatures3 84 Performs DNS queries to domains with low reputation 48->84 process4 signatures5 108 Binary is likely a compiled AutoIt script file 12->108 110 Writes to foreign memory regions 12->110 112 Maps a DLL or memory area into another process 12->112 114 Switches to a custom stack to bypass stack traces 12->114 15 svchost.exe 12->15         started        process6 signatures7 116 Maps a DLL or memory area into another process 15->116 18 LjlmrRMNRpnleyCssUCLdeLagA.exe 15->18 injected process8 process9 20 credwiz.exe 16 18->20         started        dnsIp10 54 185.234.72.101, 49731, 80 COMBAHTONcombahtonGmbHDE United Kingdom 20->54 44 C:\Users\user\AppData\Local\Temp\fztlr4.exe, PE32 20->44 dropped 46 C:\Users\user\...\OdR8akYyHwr3ISR[1].exe, PE32 20->46 dropped 88 Tries to steal Mail credentials (via file / registry access) 20->88 90 Modifies the context of a thread in another process (thread injection) 20->90 92 Maps a DLL or memory area into another process 20->92 94 2 other signatures 20->94 25 LjlmrRMNRpnleyCssUCLdeLagA.exe 20->25 injected 29 fztlr4.exe 3 20->29         started        31 firefox.exe 20->31         started        file11 signatures12 process13 dnsIp14 62 www.quickstart.design 46.28.106.211, 49733, 49737, 49739 WEDOSCZ Czech Republic 25->62 64 agoraeubebo.com 162.240.81.18, 49778, 49780, 49782 UNIFIEDLAYER-AS-1US United States 25->64 66 10 other IPs or domains 25->66 98 Maps a DLL or memory area into another process 25->98 100 Found direct / indirect Syscall (likely to bypass EDR) 25->100 33 runonce.exe 13 25->33         started        102 Multi AV Scanner detection for dropped file 29->102 104 Machine Learning detection for dropped file 29->104 106 Injects a PE file into a foreign processes 29->106 36 fztlr4.exe 29->36         started        signatures15 process16 signatures17 68 Tries to steal Mail credentials (via file / registry access) 33->68 70 Tries to harvest and steal browser information (history, passwords, etc) 33->70 72 Modifies the context of a thread in another process (thread injection) 33->72 74 Switches to a custom stack to bypass stack traces 33->74 38 LjlmrRMNRpnleyCssUCLdeLagA.exe 33->38 injected 42 firefox.exe 33->42         started        76 Maps a DLL or memory area into another process 36->76 process18 dnsIp19 56 ndhockeyprospects.com 162.241.253.174, 49756, 80 UNIFIEDLAYER-AS-1US United States 38->56 58 srripaspocon.org 15.204.0.108, 49791, 49792, 49793 HP-INTERNET-ASUS United States 38->58 60 4 other IPs or domains 38->60 96 Found direct / indirect Syscall (likely to bypass EDR) 38->96 signatures20
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2024-06-18 15:16:31 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
7c0650ed3243e74683580d04094be53ab745491ebf8e346e954264c98851be03
MD5 hash:
b9a2e3cbd23f922b5620ca3476f85eaa
SHA1 hash:
86dcdc578fda56a00753476ebe8e9286e8fa22d6
Detections:
win_formbook_w0 win_formbook_g0
SH256 hash:
636380fa5fceef572805f47a966280b893aedb61a89eea3112b1fc19a903b5f9
MD5 hash:
2a2dc8451fd3983264c0f9816bd7abba
SHA1 hash:
3b1d4a8658429b967180845cc0e88d55084c8f7e
SH256 hash:
cd6095687968bd844ac0e2326ccd75704d9245fb9a1a1a32cb962c166ed9675a
MD5 hash:
fcd3b2e01c7f0436d9aa2c32f771cd9b
SHA1 hash:
f121b217fab96f38633bfaf6615af1e30c719249
SH256 hash:
c579ce087fe3d9304f6ad521f4cf0831e9405aaa374ae0f502ef617c8a43e48b
MD5 hash:
d435e937cc8dcf935b5ebacfdbca1305
SHA1 hash:
b5dc7b56aa7d41706ea35b63e210a584ab1209ba
SH256 hash:
b07b399e8bd2031d7cacc3efb408f54877b751ce5814221e16810a4e9b47e77c
MD5 hash:
4a8f838d0a283b53f1711a2ed5961f6c
SHA1 hash:
9b884b21ed6af27b732b6bd4a28af295c6e4f810
SH256 hash:
d0f90bb2b2b8803e993430dbb4da4c254d5f5a01e735176af60b11b288b4686b
MD5 hash:
540646852f79c4823808aa2893f05c3c
SHA1 hash:
8b2be05cabf21f0681337d832cf7c842b0d821f6
SH256 hash:
d7e1436247b398f2600f3a22be238a853e7d03deb04d08eab07b1e8e8cb1eb7d
MD5 hash:
ee0d8a4c369d1fe96984d9b6ab7369be
SHA1 hash:
6e4bc5d04516320766bcfb5789e38b0854231383
SH256 hash:
22acfa293102a58a423458712854a2afd697141e0070f6e645e8a20a9b3eea80
MD5 hash:
33d00107afd95cca7ffc3851f98391c1
SHA1 hash:
41b020af164078565eda87f831a8c64599db9eb6
SH256 hash:
3f3052e88b171781ce50abc7cb82a70bc880735f7f3a39e9c75ed93aa4dac24b
MD5 hash:
62fb43ef2f711c276cfdecc790335fe9
SHA1 hash:
158b1676085cdb552e5eb5b20f4d7dadd894b7aa
Detections:
AutoIT_Compiled SUSP_Imphash_Mar23_3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:SUSP_Imphash_Mar23_3
Author:Arnim Rupp (https://github.com/ruppde)
Description:Detects imphash often found in malware samples (Maximum 0,25% hits with search for 'imphash:x p:0' on Virustotal) = 99,75% hits
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 3f3052e88b171781ce50abc7cb82a70bc880735f7f3a39e9c75ed93aa4dac24b

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::CopySid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::GetAce
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoCreateInstanceEx
ole32.dll::CoInitializeSecurity
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringW
WINMM.dll::timeGetTime
WINMM.dll::waveOutSetVolume
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
ADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::CreateProcessWithLogonW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::SetSystemPowerState
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileExW
KERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
IPHLPAPI.DLL::IcmpCreateFile
KERNEL32.dll::CreateFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2W
MPR.dll::WNetUseConnectionW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BlockInput
USER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::FindWindowW

Comments