MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54f5267dea7dfa571027e7ec1f9e8518231c8a9baff0cf49e098ecbaf86e051a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 15 File information Comments

SHA256 hash: 54f5267dea7dfa571027e7ec1f9e8518231c8a9baff0cf49e098ecbaf86e051a
SHA3-384 hash: 872e3e2517e10e670c48dae6bcba7c0b5a814ecb79e64040ed18b1bb2d8d274d67d56a54c54bcd7465921b8a25de780e
SHA1 hash: 5fb2ee22d31f84faaaa57c0562cf800c99397622
MD5 hash: 68da0fc8238154152646c59bb3bc5eda
humanhash: saturn-cardinal-winter-oregon
File name:0037827362762.exe
Download: download sample
Signature Formbook
File size:969'728 bytes
First seen:2023-09-14 14:54:38 UTC
Last seen:2023-09-14 14:54:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2ee11402fede6929cd719a165d19a6b3 (2 x ModiLoader, 1 x Formbook)
ssdeep 12288:+L5nRsetSwLTUSkRj2keaAigv4ixgKbR5hjy3H31RDHW4Qek5Dko:+RHSMTL3aKAod5h23H3fGes
Threatray 21 similar samples on MalwareBazaar
TLSH T1FC253BF563B408B9E4AEB57CC909B3D00DFB6AD96C64288995B93C4B19B7F503B2401F
TrID 74.5% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
12.2% (.EXE) InstallShield setup (43053/19/16)
4.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
3.7% (.SCR) Windows screen saver (13097/50/3)
1.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon d4d4d4d4d4d4d4c8 (4 x ModiLoader, 1 x Formbook)
Reporter TeamDreier
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
265
Origin country :
DK DK
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
0037827362762.exe
Verdict:
Malicious activity
Analysis date:
2023-09-14 14:56:29 UTC
Tags:
installer dbatloader formbook xloader stealer spyware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control keylogger lolbin overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1308040 Sample: 0037827362762.exe Startdate: 14/09/2023 Architecture: WINDOWS Score: 100 43 www.insightcherry.online 2->43 87 Found malware configuration 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 Antivirus detection for URL or domain 2->91 93 5 other signatures 2->93 12 0037827362762.exe 1 2 2->12         started        signatures3 process4 dnsIp5 51 web.fe.1drv.com 12->51 53 u0v8dq.ph.files.1drv.com 12->53 55 2 other IPs or domains 12->55 41 C:\Users\Public\Libraries\Wfmfligm.PIF, PE32 12->41 dropped 107 Drops PE files with a suspicious file extension 12->107 109 Writes to foreign memory regions 12->109 111 Allocates memory in foreign processes 12->111 113 2 other signatures 12->113 17 colorcpl.exe 2 12->17         started        file6 signatures7 process8 signatures9 81 Maps a DLL or memory area into another process 17->81 83 Sample uses process hollowing technique 17->83 85 Queues an APC in another process (thread injection) 17->85 20 eylYHzfvIWFb.exe 17->20 injected process10 process11 22 control.exe 13 20->22         started        25 autochk.exe 20->25         started        signatures12 95 Tries to steal Mail credentials (via file / registry access) 22->95 97 Tries to harvest and steal browser information (history, passwords, etc) 22->97 99 Modifies the context of a thread in another process (thread injection) 22->99 101 Maps a DLL or memory area into another process 22->101 27 explorer.exe 7 6 22->27 injected process13 dnsIp14 45 www.78669vip.com 156.234.20.4, 49750, 49751, 49752 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 27->45 47 www.christmatoy.com 79.98.25.1, 49739, 49745, 49747 RACKRAYUABRakrejusLT Lithuania 27->47 49 12 other IPs or domains 27->49 103 System process connects to network (likely due to code injection or exploit) 27->103 105 Performs DNS queries to domains with low reputation 27->105 31 Wfmfligm.PIF 27->31         started        35 Wfmfligm.PIF 27->35         started        signatures15 process16 dnsIp17 57 web.fe.1drv.com 31->57 59 u0v8dq.ph.files.1drv.com 31->59 65 2 other IPs or domains 31->65 69 Multi AV Scanner detection for dropped file 31->69 71 Machine Learning detection for dropped file 31->71 73 Writes to foreign memory regions 31->73 37 colorcpl.exe 31->37         started        61 web.fe.1drv.com 35->61 63 u0v8dq.ph.files.1drv.com 35->63 67 2 other IPs or domains 35->67 75 Allocates memory in foreign processes 35->75 77 Allocates many large memory junks 35->77 79 Injects a PE file into a foreign processes 35->79 39 colorcpl.exe 35->39         started        signatures18 process19
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2023-09-13 04:06:01 UTC
File Type:
PE (Exe)
Extracted files:
76
AV detection:
25 of 38 (65.79%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader persistence trojan
Behaviour
Modifies Internet Explorer settings
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
54f5267dea7dfa571027e7ec1f9e8518231c8a9baff0cf49e098ecbaf86e051a
MD5 hash:
68da0fc8238154152646c59bb3bc5eda
SHA1 hash:
5fb2ee22d31f84faaaa57c0562cf800c99397622
Detections:
win_dbatloader_g1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__GlobalFlags
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 54f5267dea7dfa571027e7ec1f9e8518231c8a9baff0cf49e098ecbaf86e051a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments