MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c1ea24ac3aab840b98016e4caeb82f55aed493aa3b412cb80c9fb6d6f79d9ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments

SHA256 hash: 5c1ea24ac3aab840b98016e4caeb82f55aed493aa3b412cb80c9fb6d6f79d9ad
SHA3-384 hash: 362c51a4a1f594b8dccd783dca91acf27cb5e0e017049abb24e05fb468fce76ef0a8e1044ebea85bf9aecab3dcb7547a
SHA1 hash: 48c7b7a93132da316078961771bada80dc0d12bf
MD5 hash: 04903e2823ad794eb62aefefe9c7bd67
humanhash: eight-nitrogen-artist-rugby
File name:triage_dropped_file
Download: download sample
Signature Formbook
File size:685'056 bytes
First seen:2022-06-15 11:22:16 UTC
Last seen:2022-06-15 12:05:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:ub5gGGF3oK6hg2ZEPN7LalijpUjpbZfZuvciFaKku6:85gGG6K6JZEP5elMUjpbhgB76
TLSH T1E1E4CF16F666CD26C1881B77C6D6140487349643D25BEB4B3AEE33E90E033BB9D4978B
TrID 64.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.5% (.SCR) Windows screen saver (13101/52/3)
9.2% (.EXE) Win64 Executable (generic) (10523/12/4)
5.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.9% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 00f6f6f6d2d2f600 (3 x Formbook)
Reporter malwarelabnet
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
A0C98F2D6B4A611CD4416B6983244A75EF164882
Verdict:
Malicious activity
Analysis date:
2022-06-15 14:03:59 UTC
Tags:
encrypted opendir exploit CVE-2017-11882 loader formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 646104 Sample: triage_dropped_file Startdate: 15/06/2022 Architecture: WINDOWS Score: 100 33 Malicious sample detected (through community Yara rule) 2->33 35 Antivirus detection for URL or domain 2->35 37 Multi AV Scanner detection for submitted file 2->37 39 5 other signatures 2->39 10 triage_dropped_file.exe 3 2->10         started        process3 file4 29 C:\Users\user\...\triage_dropped_file.exe.log, ASCII 10->29 dropped 47 Tries to detect virtualization through RDTSC time measurements 10->47 14 triage_dropped_file.exe 10->14         started        signatures5 process6 signatures7 49 Modifies the context of a thread in another process (thread injection) 14->49 51 Maps a DLL or memory area into another process 14->51 53 Sample uses process hollowing technique 14->53 55 Queues an APC in another process (thread injection) 14->55 17 explorer.exe 14->17 injected process8 signatures9 31 Uses ipconfig to lookup or modify the Windows network settings 17->31 20 ipconfig.exe 17->20         started        process10 signatures11 41 Modifies the context of a thread in another process (thread injection) 20->41 43 Maps a DLL or memory area into another process 20->43 45 Tries to detect virtualization through RDTSC time measurements 20->45 23 cmd.exe 1 20->23         started        25 explorer.exe 128 20->25         started        process12 process13 27 conhost.exe 23->27         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-06-15 05:35:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:s0s2 rat spyware stealer suricata trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
94eb1311e64ddd1441f1820049ce85e110592d08098bd0547324dc965fc52c23
MD5 hash:
a12c44df2adb4e318737cd1ce913d42b
SHA1 hash:
3956b1f7367d3136bae5d96b7814f5e131066c69
Detections:
win_formbook_g0 win_formbook_auto
Parent samples :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 hash:
9b5005eb993daabb59bd01b736e4b86d472055f3b0d7138c92a23e8fa55756aa
MD5 hash:
19b819429ef3163ddb885deff1d41013
SHA1 hash:
9b63b9db4e582ace3176315b78f8113b9fccd8ea
SH256 hash:
e652b282366d0a4e68ae4a0e6f86d04e502b7b3b016717180f268f41b2e4a109
MD5 hash:
9c5fd5119c435407042f2ef757da0c85
SHA1 hash:
1f7c70f8a7f34046696cc91f8d4a043186790386
SH256 hash:
0d8f5c8ec491b768b4a24b4004f4ef3d358b3fc22abbb1c429ee80e43f73bf8d
MD5 hash:
6297ff1b4376e8b2a1c0a0fbdc37ba83
SHA1 hash:
0c47b9a30a34d853379d073362d3d9e28a5997d7
SH256 hash:
5c1ea24ac3aab840b98016e4caeb82f55aed493aa3b412cb80c9fb6d6f79d9ad
MD5 hash:
04903e2823ad794eb62aefefe9c7bd67
SHA1 hash:
48c7b7a93132da316078961771bada80dc0d12bf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:exploit_any_poppopret
Author:Jeff White [karttoon@gmail.com] @noottrak
Description:Identify POP -> POP -> RET opcodes for quick ROP Gadget creation in target binaries.
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 5c1ea24ac3aab840b98016e4caeb82f55aed493aa3b412cb80c9fb6d6f79d9ad

(this sample)

  
Delivery method
Distributed via web download

Comments