MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cbfa0d520be3a7147b437f0b02a3328a569110104a5ea37dcee8c0b8e464737. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 5cbfa0d520be3a7147b437f0b02a3328a569110104a5ea37dcee8c0b8e464737
SHA3-384 hash: 0fbf95546ad76424f88fa62596070de6560501439d61f7d04de634855f5ecd510647c9ffe8addf09df4b6398e04a08f7
SHA1 hash: e1a9843be79f19e041eaf2b1afdb1f073be3bc81
MD5 hash: b5edece2337ee9ba1820e7841c79ff1b
humanhash: fifteen-quebec-nuts-august
File name:Remittance_90523_03.exe
Download: download sample
Signature Formbook
File size:1'868'800 bytes
First seen:2022-07-04 16:43:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:1UGK6m/LmDzL3UCZjkBmY6P49D/nKL5G3OgwI:1Uemu33UC2Ag9eL5u
TLSH T182853B6B3684C6FBE94876F54877CE9042C8D15AA762EFD3504DE3670BA63687D20233
TrID 69.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.9% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0c32696d556d393c (6 x Formbook)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
formbook packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 656834 Sample: Remittance_90523_03.exe Startdate: 04/07/2022 Architecture: WINDOWS Score: 100 29 www.dailycuatudong.com 2->29 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus detection for URL or domain 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 7 other signatures 2->47 10 Remittance_90523_03.exe 3 2->10         started        signatures3 process4 file5 27 C:\Users\user\...\Remittance_90523_03.exe.log, ASCII 10->27 dropped 49 Tries to detect virtualization through RDTSC time measurements 10->49 51 Injects a PE file into a foreign processes 10->51 14 Remittance_90523_03.exe 10->14         started        signatures6 process7 signatures8 53 Modifies the context of a thread in another process (thread injection) 14->53 55 Maps a DLL or memory area into another process 14->55 57 Sample uses process hollowing technique 14->57 59 Queues an APC in another process (thread injection) 14->59 17 chkdsk.exe 14->17         started        20 explorer.exe 14->20 injected process9 dnsIp10 33 Modifies the context of a thread in another process (thread injection) 17->33 35 Maps a DLL or memory area into another process 17->35 37 Tries to detect virtualization through RDTSC time measurements 17->37 23 cmd.exe 1 17->23         started        31 www.mafleursam.com 217.160.0.125, 49783, 80 ONEANDONE-ASBrauerstrasse48DE Germany 20->31 39 System process connects to network (likely due to code injection or exploit) 20->39 signatures11 process12 process13 25 conhost.exe 23->25         started       
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2022-06-24 02:42:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:s0s2 rat spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
94eb1311e64ddd1441f1820049ce85e110592d08098bd0547324dc965fc52c23
MD5 hash:
a12c44df2adb4e318737cd1ce913d42b
SHA1 hash:
3956b1f7367d3136bae5d96b7814f5e131066c69
Detections:
win_formbook_g0 win_formbook_auto FormBook
Parent samples :
2a9402ebd373051db7907618bccb58b922cdddb871a68987fb1f694527c8dc2b
5c1ea24ac3aab840b98016e4caeb82f55aed493aa3b412cb80c9fb6d6f79d9ad
cad3c55468a545fa192d342b696c573a3d19c36673fd7524e982069fe3bb6109
27d5408961dba9baf42c42b2574c863ccf523ee98fb0648559b733dd52fb37dc
e92fcd822de39355e0d89c4dc59336d4331e3d9b70a6ab54215b8ba637b53af7
cc48a92eedc0b016d5faad9bef8ea4d9831328650cc6f51064c569955b5c2382
d061f19eed59dc92d6ec275adb6b2e0c679bb637518a396384a47d3e184f7c6a
b062a9d743bcc3af9728b50385318d53924a65ad2defffae0ff625b6300280d1
981a126a3d6e3825ba435c9487988fd7a17fec0b7f2528a7229f2ae3a1798800
7d9650c0643e34d7b2485adaba2e2e2171e769d99e61839bda67e38cb595c312
5cbfa0d520be3a7147b437f0b02a3328a569110104a5ea37dcee8c0b8e464737
21f2e5161deb44fb1a6d6c1e043f835893333f90e029bbab3122bd1cc15957a7
8bb6042a5324981df5fc9259ab15da7c6badfb20be1d99cfe987634d9e37ea83
947f2382fc8bc6976d1fd37ac489d9ea783f0a1becfe36d44943596f1178deef
83a39de3decd05ed18f53402e780bb5fbb1d6cd90d916f3821ba338c9cd579d8
8b6765f7849153e97570cb7e438f1ec7934d49de37aaad4132e7f1f45be5fbc7
329b572ec9a7899496a335c8b6fa8a3a697c07cfc1161ca734ef379a33a27c48
a83621a531d4c85f70448ed30a4fca11be7154b28efa5c9853bb34766ac528e9
8cfab7564a09852f6ac15b97c02e63ea07b6099f6d38d39c05b06c8e097e6d31
eded2b81ae40fd2694db87102fbf5d69269de019853bd8062af52a1ac20d6d23
528eeb06e53ab90b33bb403f8b5b89c614c1ceeccbcb18429457dd69821d52cb
d4a853b38027915f1ea1daa506995a272250a5d56573d196ce52060a763e6b64
ef776f82fa51452cb7b8c4b4e8ba7b66481f7fd6f5d36056081ebd1c3326cc68
fe08d4765f0542daa638810065f54c1350df10aff72215191b66df811ab03e5e
fab49681b75999edcaa791c702fc8dabc22071fbc87013846ea9f9b009af4865
3b520fa20ca7de3ec42ddff17915a68c486136893a619d0abf8b6a2902a211e9
64c512b6660421797a005272a4b5e65981657619d28f0d8b27b399d58cd111e5
c8483d4d8ae1ce3227dbc11e8cfaffa8559cce0ea5189adca701c01b0e439cb9
e161e6e99cf402f075203ab98962e6c3f043f49f3a342c443f8480ae05898663
e5699b27604861d602353161493e6f3af720a33440d251d18b6e0f1322e88693
ec0ce1b19008446f177ac30c5bbcf55c714b1f43c7fe473068f562e8428aefc7
SH256 hash:
fa9f838355272d5b71f45ea6d742429e21bfeb78fd03761d7ef4d52bb5a6313b
MD5 hash:
882efe5d44bfe9eb966fe3a017cfcf19
SHA1 hash:
b5f1188bb81dbf86f86ac38ab5545c6177632088
SH256 hash:
290b0d0e98035abc713d582608f8be667f59f8308954a3d633f306d4081d26b8
MD5 hash:
54fbbd52558ddbad4dc728eab43d2ff6
SHA1 hash:
0c67584e33b6190b80f86a8040f05adefa4e5ca9
SH256 hash:
0d8f5c8ec491b768b4a24b4004f4ef3d358b3fc22abbb1c429ee80e43f73bf8d
MD5 hash:
6297ff1b4376e8b2a1c0a0fbdc37ba83
SHA1 hash:
0c47b9a30a34d853379d073362d3d9e28a5997d7
SH256 hash:
5cbfa0d520be3a7147b437f0b02a3328a569110104a5ea37dcee8c0b8e464737
MD5 hash:
b5edece2337ee9ba1820e7841c79ff1b
SHA1 hash:
e1a9843be79f19e041eaf2b1afdb1f073be3bc81
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 5cbfa0d520be3a7147b437f0b02a3328a569110104a5ea37dcee8c0b8e464737

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments