MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4237d59dc3ae1263c38b45de37e7f6d5a13223cb2166fea0394a5593dd7f5520. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | 4237d59dc3ae1263c38b45de37e7f6d5a13223cb2166fea0394a5593dd7f5520 |
|---|---|
| SHA3-384 hash: | 04d5e79a8b953bebd2253f72659a876c17649e871d54dc33e18f14764651e4fa5412de84f26ba30616b9bbd3d51e4a00 |
| SHA1 hash: | 8ffe85bb36801c85bc9dc5513bf5374967d8f368 |
| MD5 hash: | e91f0d916667c2b487e6f7def1a83f04 |
| humanhash: | carolina-cardinal-illinois-illinois |
| File name: | 4237d59dc3ae1263c38b45de37e7f6d5a13223cb2166fea0394a5593dd7f5520 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'360'839 bytes |
| First seen: | 2024-10-09 12:18:54 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 369fe35b86c83b3130c02698158a4d4d (14 x Formbook, 4 x RedLineStealer, 4 x AgentTesla) |
| ssdeep | 24576:LRmJkcoQricOIQxiZY1WNyt3Zrz0ffIB+L2I/aAOx47jXRpGn:IJZoQrbTFZY1WNyRO4Bep/aAO4pGn |
| Threatray | 1'130 similar samples on MalwareBazaar |
| TLSH | T15655E121F5C68076C2B323719E7EF36A9A3D79360327D29737C81D215EA05816B2A773 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | b150b26869b2d471 (468 x Formbook, 101 x RedLineStealer, 94 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIt |
|---|---|
| Author: | Jean-Philippe Teissier / @Jipe_ |
| Description: | AutoIT packer |
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::CopySid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetAce USER32.dll::GetUserObjectSecurity ADVAPI32.dll::InitializeAcl ADVAPI32.dll::InitializeSecurityDescriptor |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl ADVAPI32.dll::GetTokenInformation |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.DLL::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.DLL::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.DLL::TerminateProcess KERNEL32.DLL::SetSystemPowerState KERNEL32.DLL::LoadLibraryW KERNEL32.DLL::LoadLibraryExW KERNEL32.DLL::LoadLibraryA KERNEL32.DLL::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.DLL::WriteConsoleW KERNEL32.DLL::SetStdHandle KERNEL32.DLL::GetConsoleCP KERNEL32.DLL::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.DLL::CopyFileW KERNEL32.DLL::CreateDirectoryW KERNEL32.DLL::CreateHardLinkW KERNEL32.DLL::CreateFileW KERNEL32.DLL::DeleteFileW KERNEL32.DLL::MoveFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.DLL::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_SVC_API | Can Manipulate Windows Services | ADVAPI32.dll::OpenSCManagerW ADVAPI32.dll::UnlockServiceDatabase |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.