MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 66f9d333194115f04debc38cc2cb6fa31c443b19889b7ba438223ae1d8009e9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 66f9d333194115f04debc38cc2cb6fa31c443b19889b7ba438223ae1d8009e9e |
|---|---|
| SHA3-384 hash: | 39b150361fc710fdef9f9a545ed468e5ab05535873b50aa80588b66967ce97c9d0296d62a6fc30bc2e8ea102d4ffa6be |
| SHA1 hash: | 4b13ce08e335d9b2be1d807e7b7dd836177f9274 |
| MD5 hash: | 49f99fe8437871d1526e0874404ad440 |
| humanhash: | seven-connecticut-queen-bluebird |
| File name: | SKMBT_C9020112023 PDF.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 654'848 bytes |
| First seen: | 2023-12-22 09:56:56 UTC |
| Last seen: | 2023-12-22 11:14:37 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:HZSyieomWOHSIhoKysvh0Heu2pNcyxtntoReQ8zqC7ssnYoGC4Q4:pC/B6oKysGOvxWS75UC4Q |
| Threatray | 909 similar samples on MalwareBazaar |
| TLSH | T10DD4F1953768AF12D13E4BFA0651350903F2965E3079EB0C8DD221D76AA5F028F61FEB |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
2
# of downloads :
341
Origin country :
DEVendor Threat Intelligence
Detection:
Formbook
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed
Verdict:
Malicious
Labled as:
Malware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Detection:
formbook
Threat name:
ByteCode-MSIL.Trojan.Malgent
Status:
Malicious
First seen:
2023-12-22 09:57:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
20
AV detection:
16 of 22 (72.73%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 899 additional samples on MalwareBazaar
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:g11y rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Unpacked files
SH256 hash:
6ff7eef9360cc9ee0310f08411dc1de34746b44321b5784671dbf5f3d9bcca30
MD5 hash:
82f3cd4d9304a5e097cf2831a829b30d
SHA1 hash:
a025216f4268e46752872985d03fe0b718b3c4be
Detections:
FormBook
win_formbook_w0
win_formbook_auto
win_formbook_g0
Formbook
Parent samples :
7d7af49eae5e4d1d32af7575a6ecd2a2c9e6b6be95edf5026e3eebde23e44038
08bd19ee270606f776e998984c478e35eb93b7a8eade7c4d945d2869ece51ed9
1689e8640744d9c02fb7afae8b9d62cc9c464d12ee33a7ef65f72e8840d47733
4f8ef9616b1237912967776aff09a8b8fea96837f78787911ce7405ecb4b001d
66f9d333194115f04debc38cc2cb6fa31c443b19889b7ba438223ae1d8009e9e
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf
08bd19ee270606f776e998984c478e35eb93b7a8eade7c4d945d2869ece51ed9
1689e8640744d9c02fb7afae8b9d62cc9c464d12ee33a7ef65f72e8840d47733
4f8ef9616b1237912967776aff09a8b8fea96837f78787911ce7405ecb4b001d
66f9d333194115f04debc38cc2cb6fa31c443b19889b7ba438223ae1d8009e9e
fd032e026a2d0dc8f80370acf62e120c4a04fb1fd46318839f162f1949ad0edf
SH256 hash:
3f0746a62ed6b9988d22e459a082f0f74c09a7274340135a128a8c8f196be56d
MD5 hash:
d2b9519a68c26ab421a5b315e4622dbb
SHA1 hash:
e3b3b999022a3acc4fd91546c8269a67dc586175
SH256 hash:
0f49d90bba0035f57e41b8a4afb6f48e23945fcc9a73d6552b844c20829efac4
MD5 hash:
eb6a5d03227b41356d54a42c2d13492e
SHA1 hash:
77abf7582bf2d8ab60411623ba57467ec9269366
SH256 hash:
644f08475f0cbdcc7521816db34c0aeeed4a4c862a859bc5cbdbcd8f9e19a2d6
MD5 hash:
bdc8293e4ec7c4a36ff01ee00eed173b
SHA1 hash:
09f2690761ac8219a218dfcf23d4549b0d4940f1
SH256 hash:
66f9d333194115f04debc38cc2cb6fa31c443b19889b7ba438223ae1d8009e9e
MD5 hash:
49f99fe8437871d1526e0874404ad440
SHA1 hash:
4b13ce08e335d9b2be1d807e7b7dd836177f9274
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.