MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 48d92c8ffc4d4b1f994fb5ab97c8a173de561bb7e8a5e08ce6d6042039def6dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 17
| SHA256 hash: | 48d92c8ffc4d4b1f994fb5ab97c8a173de561bb7e8a5e08ce6d6042039def6dc |
|---|---|
| SHA3-384 hash: | 182dfa784ebfe79bebe72579126ce9919379575a03b10f23f28f20953d15d128a4cf069b685bfa3b8554f73871a111c3 |
| SHA1 hash: | eba2b3361e6cc494bc2cec9be03c0efebd73d266 |
| MD5 hash: | 7edeb47a30069ec0baff6b15135c556a |
| humanhash: | sweet-finch-angel-tango |
| File name: | Order nr. VEN2440_IMG.pdf.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 772'096 bytes |
| First seen: | 2024-03-04 13:41:09 UTC |
| Last seen: | 2024-03-04 15:24:11 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:J8S+oGOKcIPEJL9bW9ez9SFs7E+Ig+fY9F08ttyr7Bbgfp6carGDkWUhFP4KkqKP:0EJL9iykFs1V+fGDfy35gfspWkJkqvzO |
| Threatray | 594 similar samples on MalwareBazaar |
| TLSH | T12EF4E059236CAB72D67A8BF4546098105BF1312FE53EEA4A0DD234CB6AB1F244F42F53 |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
dcef69c94d8166b5bd96de0c8b5cc686bc3ec021c7754b43900a50a7913e0a9b
fbe9af0d5f4eec35c73a7362af2c095693882f614e7fa42b9acdb0476bb5fb20
0615ef112cce9f3111818a05ca04def31168070e160976b0f9f914b1807ef5ba
780749c5cfc69b6f4fc04b09709df33cd35a759dfaa4957c596dafd9a0ff11ab
77950a73e1fe319456c2eb3d13de26a1917cfa965bdb5016ad303f0ce9385501
1370d337f24395dc30833b04e4166d1820bcfc70a947132f15849c81a8f55c64
0df39b8c26a1b395b2389908f7dc4781aabba0aa10f4642baf46b8f1a9e2c426
77b71576856185e15daeb6b0ad20b0745c744a8f14dad72c98f479f2802bf545
494303b1cbd6db4ad8784f03ef83b345bf61105cf975fd1c2021a1d7fb4c5430
314a88c948270abad76c13c0e5800683ccc78392fed92673c50e14aace7576f3
bdf27a5c5327e39ec2d7b3a6a7c5068b68f0d0e46791c7afad0ecd6b1a803ef5
48d92c8ffc4d4b1f994fb5ab97c8a173de561bb7e8a5e08ce6d6042039def6dc
61e617222671bb531f25efd53cfc40311283984ef4d1366dc747a913e8294f40
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_AgentTesla_ebf431a8 |
|---|---|
| Author: | Elastic Security |
| Reference: | https://www.elastic.co/security-labs/attack-chain-leads-to-xworm-and-agenttesla |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.