MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 676528e924dfe6e5e119f33ac5e7e8ee5661f871759e4b32ac27b0a1d243e329. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 676528e924dfe6e5e119f33ac5e7e8ee5661f871759e4b32ac27b0a1d243e329
SHA3-384 hash: 4a5ba27331e12e1d9155850705cbc969e0da1b2da504b1814dd5d840a73f29253bc4c8398e7af990fe4d2e479e34d851
SHA1 hash: e9e69b71db06550b281b2b794c805cea96affeeb
MD5 hash: 24ce2f86b3f6976ac1da7ddd0b38fda0
humanhash: eight-beryllium-connecticut-september
File name:676528e924dfe6e5e119f33ac5e7e8ee5661f871759e4b32ac27b0a1d243e329
Download: download sample
Signature Formbook
File size:821'248 bytes
First seen:2025-02-07 14:25:34 UTC
Last seen:2025-02-07 15:42:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:MzSggsibzj2aB/Eh1C0eBdUUnm1iFUsdMbLBU:Mz0V9Eh1ABGUnm8FfdsLBU
TLSH T16705AEC13FA4AB09CE3E7534A495CC7553B12A28B465F7E6A6D8B753368C3118E0DF0A
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
419
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
676528e924dfe6e5e119f33ac5e7e8ee5661f871759e4b32ac27b0a1d243e329
Verdict:
Suspicious activity
Analysis date:
2025-02-07 17:33:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus shell msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Adding an exclusion to Microsoft Defender
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1609555 Sample: RLrPxMQqI6.exe Startdate: 07/02/2025 Architecture: WINDOWS Score: 100 39 www.lussalesapp.website 2->39 41 www.ltraman.pro 2->41 43 3 other IPs or domains 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for URL or domain 2->49 51 9 other signatures 2->51 11 RLrPxMQqI6.exe 4 2->11         started        signatures3 process4 file5 37 C:\Users\user\AppData\...\RLrPxMQqI6.exe.log, ASCII 11->37 dropped 53 Adds a directory exclusion to Windows Defender 11->53 55 Tries to detect virtualization through RDTSC time measurements 11->55 57 Injects a PE file into a foreign processes 11->57 59 Switches to a custom stack to bypass stack traces 11->59 15 RLrPxMQqI6.exe 11->15         started        18 powershell.exe 23 11->18         started        20 RLrPxMQqI6.exe 11->20         started        signatures6 process7 signatures8 69 Modifies the context of a thread in another process (thread injection) 15->69 71 Maps a DLL or memory area into another process 15->71 73 Sample uses process hollowing technique 15->73 77 2 other signatures 15->77 22 explorer.exe 33 1 15->22 injected 75 Loading BitLocker PowerShell Module 18->75 24 WmiPrvSE.exe 18->24         started        26 conhost.exe 18->26         started        process9 process10 28 control.exe 22->28         started        31 autochk.exe 22->31         started        signatures11 61 Modifies the context of a thread in another process (thread injection) 28->61 63 Maps a DLL or memory area into another process 28->63 65 Tries to detect virtualization through RDTSC time measurements 28->65 67 Switches to a custom stack to bypass stack traces 28->67 33 cmd.exe 1 28->33         started        process12 process13 35 conhost.exe 33->35         started       
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2025-01-29 13:08:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook captiveaaloader unknown_loader_037
Similar samples:
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:bc01 discovery execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Unpacked files
SH256 hash:
676528e924dfe6e5e119f33ac5e7e8ee5661f871759e4b32ac27b0a1d243e329
MD5 hash:
24ce2f86b3f6976ac1da7ddd0b38fda0
SHA1 hash:
e9e69b71db06550b281b2b794c805cea96affeeb
SH256 hash:
ffb97d9798a95e8bf0762ef3261ec76c3d510e2e12fb1e53a433c184c02dbb10
MD5 hash:
0cfaf885e248d58f7b236e6efdf716d0
SHA1 hash:
b25d9f8855fc09d2aec9882e5d8605e28108eb43
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
Parent samples :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 hash:
66b3255d6c4aa592921e7d3fe6d0bdbef3c0af2b008e15c4a7de78ffc0aca2f5
MD5 hash:
e961122a57c90d4a359d227ce8fa39e0
SHA1 hash:
f96b138bc7aab4fe350f59b9ad441348ffd5659a
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
07864a36094fdb51d595bc3e42bce8429054de6c820f8c9dcfe1820c0fd1f8ff
MD5 hash:
d3b47fb3dd8b1c832901282b2d95a83b
SHA1 hash:
84d0afe2d8b7efd5f06eab1ac26d2bc9e25f9c38
Detections:
win_formbook_w0 win_formbook_g0 win_formbook_auto FormBook Formbook Windows_Trojan_Formbook
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments