MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3febf03463e0e65ef9d0fc4e8a38f01dd7c6dfee10258876981539b7a319a620. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 3febf03463e0e65ef9d0fc4e8a38f01dd7c6dfee10258876981539b7a319a620
SHA3-384 hash: 416263eed709b3159660b4b9f9f2ce30fccdb61bde13a3d7035edfbb12f3b2bf390d0d283241c6a5c84c68c9cd0cc5bb
SHA1 hash: 337bf5031b7af55d8086087055232b1f7478115f
MD5 hash: 44e07e65592320653431e87050b8714f
humanhash: comet-shade-venus-enemy
File name:44E07E65592320653431E87050B8714F.exe
Download: download sample
Signature Formbook
File size:4'642'056 bytes
First seen:2021-08-24 21:51:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yZ1kDmwxdhbRSUnR1tooSvpKoLiRZmmYjWNiOm:yZ1kDmwxdh3Beps4JWNiN
Threatray 408 similar samples on MalwareBazaar
TLSH T13926331E710011B6FBB392F06672571215B2EB1EAFA2819F4170D6B348BFE12B169FD4
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Formbook C2:
http://185.234.247.35/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.234.247.35/ https://threatfox.abuse.ch/ioc/193640/

Intelligence


File Origin
# of uploads :
1
# of downloads :
352
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
44E07E65592320653431E87050B8714F.exe
Verdict:
No threats detected
Analysis date:
2021-08-24 21:54:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Sending a UDP request
Searching for the window
Running batch commands
Connection attempt
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 471048 Sample: Ti0Llyz763.exe Startdate: 24/08/2021 Architecture: WINDOWS Score: 100 112 144.202.76.47 AS-CHOOPAUS United States 2->112 114 192.168.2.3 unknown unknown 2->114 140 Antivirus detection for URL or domain 2->140 142 Antivirus detection for dropped file 2->142 144 Multi AV Scanner detection for dropped file 2->144 146 12 other signatures 2->146 13 Ti0Llyz763.exe 10 2->13         started        signatures3 process4 file5 96 C:\Users\user\AppData\...\setup_installer.exe, PE32 13->96 dropped 16 setup_installer.exe 18 13->16         started        process6 file7 68 C:\Users\user\AppData\...\setup_install.exe, PE32 16->68 dropped 70 C:\Users\user\...\Sat11fd6030c84e52.exe, PE32 16->70 dropped 72 C:\Users\user\...\Sat11debc3fcd798.exe, PE32 16->72 dropped 74 13 other files (2 malicious) 16->74 dropped 19 setup_install.exe 1 16->19         started        process8 dnsIp9 116 172.67.142.91 CLOUDFLARENETUS United States 19->116 118 127.0.0.1 unknown unknown 19->118 148 Adds a directory exclusion to Windows Defender 19->148 23 cmd.exe 19->23         started        25 cmd.exe 1 19->25         started        28 cmd.exe 1 19->28         started        30 8 other processes 19->30 signatures10 process11 signatures12 32 Sat11908f03124b3.exe 23->32         started        150 Submitted sample is a known malware sample 25->150 152 Obfuscated command line found 25->152 154 Uses ping.exe to sleep 25->154 156 2 other signatures 25->156 37 powershell.exe 14 25->37         started        39 Sat11debc3fcd798.exe 86 28->39         started        41 Sat1104874315.exe 30->41         started        43 Sat11a4b372b2.exe 30->43         started        45 Sat11fd6030c84e52.exe 2 30->45         started        47 4 other processes 30->47 process13 dnsIp14 98 185.233.185.134 YURTEH-ASUA Russian Federation 32->98 100 37.0.10.214 WKD-ASIE Netherlands 32->100 108 12 other IPs or domains 32->108 76 C:\Users\...\zEIy_rQUfzBlP8nk5eq2iDkE.exe, PE32 32->76 dropped 78 C:\Users\...\yXCMzzLqSDcUi0iLe4CR_Lcj.exe, PE32 32->78 dropped 80 C:\Users\...\sYSGQMtx526g_kg4TJZfFcBN.exe, PE32 32->80 dropped 90 49 other files (39 malicious) 32->90 dropped 122 Drops PE files to the document folder of the user 32->122 124 Creates HTML files with .exe extension (expired dropper behavior) 32->124 126 Tries to harvest and steal browser information (history, passwords, etc) 32->126 128 Disable Windows Defender real time protection (registry) 32->128 102 188.34.200.103 HETZNER-ASDE Germany 39->102 104 74.114.154.18 AUTOMATTICUS Canada 39->104 82 C:\Users\user\AppData\...\freebl3[1].dll, PE32 39->82 dropped 84 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 39->84 dropped 92 10 other files (none is malicious) 39->92 dropped 130 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 39->130 132 Tries to steal Crypto Currency Wallets 39->132 49 cmd.exe 41->49         started        51 dllhost.exe 41->51         started        134 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 43->134 136 Checks if the current machine is a virtual machine (disk enumeration) 43->136 53 explorer.exe 43->53 injected 138 Creates processes via WMI 45->138 55 Sat11fd6030c84e52.exe 45->55         started        106 208.95.112.1 TUT-ASUS United States 47->106 110 6 other IPs or domains 47->110 86 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 47->86 dropped 88 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 47->88 dropped file15 signatures16 process17 dnsIp18 59 cmd.exe 49->59         started        62 conhost.exe 49->62         started        120 104.21.70.98 CLOUDFLARENETUS United States 55->120 94 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 55->94 dropped 64 conhost.exe 55->64         started        file19 process20 signatures21 158 Obfuscated command line found 59->158 160 Uses ping.exe to sleep 59->160 66 findstr.exe 59->66         started        process22
Threat name:
Win32.Downloader.Upatre
Status:
Malicious
First seen:
2021-08-21 12:53:57 UTC
AV detection:
28 of 46 (60.87%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:socelars family:vidar family:xmrig botnet:706 botnet:937 botnet:pub1 aspackv2 backdoor discovery dropper infostealer loader miner persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
XMRig Miner Payload
Glupteba
Glupteba Payload
MetaSploit
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
xmrig
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
viacetequn.site:80
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
8963306b8dc579e19514edd491facb365cd40e16aaeecd475f2c355a724272bc
MD5 hash:
400653e50c7a17bba9549b6a191c0a1f
SHA1 hash:
11a7ce981de51465001bc0dfb3c348b4f2284d84
SH256 hash:
8a50b4a3ca9075a5e08e3f806db877c1b88305d13ba351276beed4a6fec8dd26
MD5 hash:
e75e1440eb164e13fa365e10ff894e7f
SHA1 hash:
0c24e02233a60a2eaeb293636c306d60acafe1ae
SH256 hash:
3001a2f2078c662d868c8893fac751274028d1b43ba3a8d96ae703a162d25892
MD5 hash:
896f2994b5067ca2dde8a62d8fc79328
SHA1 hash:
0230b505866ece8874ccf4a3fa939ff26be0ea77
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
1d53a1741021d44478a5beea3fe9c2dad1d06f432f241acb36e6b9b31660c814
MD5 hash:
bbf07901d12da487eb9edc8a8f1d33c8
SHA1 hash:
f5564a97cc708c758acbb658332a41997d89aa7a
SH256 hash:
6899c55c1026ab6b0df2ee83a1356a726c4e0b0784da8ab622aaeb8c5c9a5ce2
MD5 hash:
2dfcb8b93364fc615985de998bc12b8e
SHA1 hash:
d736cbe7767a0fbad53183686de7db2ee846c5ee
SH256 hash:
8a77dd50b720322088fbe92aeba219cc744bd664ff660058b1949c3b9b428bac
MD5 hash:
d1d4b4d26a9b9714a02c252fb46b72ce
SHA1 hash:
af9e34a28f8f408853d3cd504f03ae43c03cc24f
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
8f69aaa745c9fe04bce3cf53d14039458d447e118e12f18b1ad0f4677e7afa52
MD5 hash:
e94ef8e75a36ac10e9201ab42b8575aa
SHA1 hash:
8ddecf38cefe561c310416cd07f5e8d2a582aa7e
SH256 hash:
93ceb96ff1dcf3e9d8167efedb588790635e92693de9030086e740684a05b924
MD5 hash:
fb108da5b975ef4806285a8c6b1027a8
SHA1 hash:
486cca0bbda98482a07fd3307c17e9015fb0121a
SH256 hash:
283a0531459a9e297133b34903ec4ee45ce37074e51883ff3299bed408fe619f
MD5 hash:
38eebefde983895d978e1768c67213ab
SHA1 hash:
3e17dc8768ff5e450e481f874bc87587f6988c89
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
ca89a366942c47c5fa7147f46ba60149e92fde9970177e488b833a05afcfd3cd
MD5 hash:
462adaa83391f4e16a17e14cc2908275
SHA1 hash:
d72a1b8a558e8bb2e7f2964ddd274c7f3876f8b8
SH256 hash:
258f1ac9777db9b7eefca184819271174f58d1a94da1c247924be7f9a6e7ca86
MD5 hash:
b8d3986e5edbff2ea1670955868fc6b5
SHA1 hash:
31f832cc18581fb8a3077e3ac2441d056854525b
SH256 hash:
40f61917675314d06fb4b24d7cf21a90dd0e5ba30fde2d69e9fabfa59c6195a0
MD5 hash:
eabfbbb47dcb2be59558cff648d8b88c
SHA1 hash:
494a5146b04cd399533f7ea82df5cff9453b15e8
SH256 hash:
127eb6c39e6a8c4c98ad513e70bd22497fc64edef29ed116b81e12864fe0f4aa
MD5 hash:
0fa7fc5d98fa71a727922030ec6d8cb0
SHA1 hash:
ce7aa2ae1c47d8bb8d6562b51f3eee1a41bad84b
SH256 hash:
bd1efd5afdb63a752bd0c279e3b75cbc5b8c1fc8c399730ff9e6699f21d82bc4
MD5 hash:
f2cd1b2989702eb1b23ddf03dac4e0f6
SHA1 hash:
cc351afd99672f7544e49b9f0d1c28a8f4da544a
SH256 hash:
3febf03463e0e65ef9d0fc4e8a38f01dd7c6dfee10258876981539b7a319a620
MD5 hash:
44e07e65592320653431e87050b8714f
SHA1 hash:
337bf5031b7af55d8086087055232b1f7478115f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments