MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40a843a0603d0fe585a83443f4dcf86c4b867122946e25443c5c3288f56efd8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments

SHA256 hash: 40a843a0603d0fe585a83443f4dcf86c4b867122946e25443c5c3288f56efd8b
SHA3-384 hash: 788eae0825dd52d2df15276f650dfccbfde49830272889d2f846feb044f2ab25b16713a0fea5f8f0299c76fb1d751ee4
SHA1 hash: 9ba15e67bdf1af12ef5a975634ce767be8f3219c
MD5 hash: 2d97dbe3882c05bb2281b27d21675218
humanhash: romeo-undress-angel-earth
File name:z1CurriculumVitaeIsabelGonzalez.exe
Download: download sample
Signature Formbook
File size:276'766 bytes
First seen:2023-06-28 11:06:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader)
ssdeep 6144:wYa6OVOayqELplP5XTFD7okEkUEEcTsNPMj9xO3ckGUXX9SKE:wYAgayqSpR5XNr7TTsNPMm3yAX9zE
Threatray 1'614 similar samples on MalwareBazaar
TLSH T1E54402C4ABB994F3E9524E32113ACA09BD75ED3819409B874600FA6C7EF52D29D0F367
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon fcd8d0d2dac0c0e4 (44 x Formbook, 1 x AgentTesla, 1 x XWorm)
Reporter FXOLabs
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
356
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
z1CurriculumVitaeIsabelGonzalez.exe
Verdict:
Suspicious activity
Analysis date:
2023-06-28 11:09:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Creating a file
Unauthorized injection to a recently created process
Restart of the analyzed sample
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control lolbin overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, NSISDropper
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected NSISDropper
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nemesis
Status:
Malicious
First seen:
2023-06-28 10:47:44 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Unpacked files
SH256 hash:
606b7769d9be963ad8fdaad3d4aa172a6e3cbc58dd335a34a858b38f0938da07
MD5 hash:
8ecf2e333a66e25a9b7bf2d727d9a3a0
SHA1 hash:
c28d64b57e63c06188663a1e6bb72888b970bf82
Detections:
win_formbook_w0 win_formbook_auto win_formbook_g0 win_formbook_w0 win_formbook_auto win_formbook_g0 win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
90f63cd736c3bb22bebed8db95204533fe328900a98c6843ba71a013bf6b6ba0
MD5 hash:
b3d8a923d89ad7359f24dcf1be412ebf
SHA1 hash:
0a68d61aa5be3f1d828dc57b394e6ce9caa4a0c0
SH256 hash:
c861130e929708464fba4e563356fcd314fff60b537952a3221aeb21175245fd
MD5 hash:
98e47be09c31b6d8d7e9f967884e025b
SHA1 hash:
ae41b3d9e8ffae62f4eb02493c848dc9f625d7ba
SH256 hash:
606b7769d9be963ad8fdaad3d4aa172a6e3cbc58dd335a34a858b38f0938da07
MD5 hash:
8ecf2e333a66e25a9b7bf2d727d9a3a0
SHA1 hash:
c28d64b57e63c06188663a1e6bb72888b970bf82
Detections:
win_formbook_w0 win_formbook_auto win_formbook_g0 win_formbook_w0 win_formbook_auto win_formbook_g0 win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
606b7769d9be963ad8fdaad3d4aa172a6e3cbc58dd335a34a858b38f0938da07
MD5 hash:
8ecf2e333a66e25a9b7bf2d727d9a3a0
SHA1 hash:
c28d64b57e63c06188663a1e6bb72888b970bf82
Detections:
win_formbook_w0 win_formbook_auto win_formbook_g0 win_formbook_w0 win_formbook_auto win_formbook_g0 win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
90f63cd736c3bb22bebed8db95204533fe328900a98c6843ba71a013bf6b6ba0
MD5 hash:
b3d8a923d89ad7359f24dcf1be412ebf
SHA1 hash:
0a68d61aa5be3f1d828dc57b394e6ce9caa4a0c0
SH256 hash:
c861130e929708464fba4e563356fcd314fff60b537952a3221aeb21175245fd
MD5 hash:
98e47be09c31b6d8d7e9f967884e025b
SHA1 hash:
ae41b3d9e8ffae62f4eb02493c848dc9f625d7ba
SH256 hash:
90f63cd736c3bb22bebed8db95204533fe328900a98c6843ba71a013bf6b6ba0
MD5 hash:
b3d8a923d89ad7359f24dcf1be412ebf
SHA1 hash:
0a68d61aa5be3f1d828dc57b394e6ce9caa4a0c0
SH256 hash:
c861130e929708464fba4e563356fcd314fff60b537952a3221aeb21175245fd
MD5 hash:
98e47be09c31b6d8d7e9f967884e025b
SHA1 hash:
ae41b3d9e8ffae62f4eb02493c848dc9f625d7ba
SH256 hash:
40a843a0603d0fe585a83443f4dcf86c4b867122946e25443c5c3288f56efd8b
MD5 hash:
2d97dbe3882c05bb2281b27d21675218
SHA1 hash:
9ba15e67bdf1af12ef5a975634ce767be8f3219c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 40a843a0603d0fe585a83443f4dcf86c4b867122946e25443c5c3288f56efd8b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments