MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | 70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0 |
|---|---|
| SHA3-384 hash: | 573f54058c000777b515c4bcafeb6125176fc376647a44b4299cf47035c2dbf7d71e7e695feb628f13fcd1fc4334e3b9 |
| SHA1 hash: | 4ac1d56860e24c720169ea1ce96075d748de8937 |
| MD5 hash: | e8c7d9168a273e2c2ddcdd8ae1248dab |
| humanhash: | sixteen-item-robert-carbon |
| File name: | Shipping Documents.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 849'920 bytes |
| First seen: | 2024-09-10 13:02:43 UTC |
| Last seen: | 2024-09-11 12:58:03 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:meyNX2ts4xyoVYmb20IAx3FLhaFBpSBV+tA4Lhb/17vXYJQ6omPJbJpy7A1yo8:meyElJyAvgpT5btDXFNmZJU7GyH |
| Threatray | 2'375 similar samples on MalwareBazaar |
| TLSH | T19D05E0161798DC19C1BEE3B4656AC1310775EE1AF9A2E3A7CFC1F9E33E19310681670A |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
3
# of downloads :
413
Origin country :
CHVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Shipping Documents.exe
Verdict:
Suspicious activity
Analysis date:
2024-09-10 13:05:37 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Network Static Stealth Msil
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
masquerade packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2024-09-10 10:02:17 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 2'365 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
discovery execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Uses the VBS compiler for execution
Command and Scripting Interpreter: PowerShell
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
928a3ed4c194379c46bce36c6ea2f603e8006cff91920c860d74b9eb02f0ccf7
MD5 hash:
e82f5b7d03ef6dfdf40c20c9b198736c
SHA1 hash:
5c7abd85c15b805cee21bec9af4e521453c06838
Detections:
win_formbook_g0
win_formbook_w0
SH256 hash:
2a38752dcc41d0da1f186dff724d5481747400d10c95957fbeb110c48c84cf56
MD5 hash:
4fd586104b9cc20080cb4540a57e1aef
SHA1 hash:
83b79a551bbcd970f896953f3d30e43cdc620062
SH256 hash:
7c7ae5661b2aa3d7bbee088e55c3cf37f1ec002ed88c7b312ad53ce1d090e150
MD5 hash:
a081970498ac3f9704c439711d0949de
SHA1 hash:
34900c04c98e2fcf227ee79715ed4edd32a16562
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
c59a72e874640d2d2c5669edc14fdeb82a72cbacde61679907d2926b8ed79d08
MD5 hash:
b37fc99b846edbde0d0f36bee1760849
SHA1 hash:
0016396b048dcbda5b87742c32678f706db6362c
SH256 hash:
70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0
MD5 hash:
e8c7d9168a273e2c2ddcdd8ae1248dab
SHA1 hash:
4ac1d56860e24c720169ea1ce96075d748de8937
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.