MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0
SHA3-384 hash: 573f54058c000777b515c4bcafeb6125176fc376647a44b4299cf47035c2dbf7d71e7e695feb628f13fcd1fc4334e3b9
SHA1 hash: 4ac1d56860e24c720169ea1ce96075d748de8937
MD5 hash: e8c7d9168a273e2c2ddcdd8ae1248dab
humanhash: sixteen-item-robert-carbon
File name:Shipping Documents.exe
Download: download sample
Signature Formbook
File size:849'920 bytes
First seen:2024-09-10 13:02:43 UTC
Last seen:2024-09-11 12:58:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:meyNX2ts4xyoVYmb20IAx3FLhaFBpSBV+tA4Lhb/17vXYJQ6omPJbJpy7A1yo8:meyElJyAvgpT5btDXFNmZJU7GyH
Threatray 2'375 similar samples on MalwareBazaar
TLSH T19D05E0161798DC19C1BEE3B4656AC1310775EE1AF9A2E3A7CFC1F9E33E19310681670A
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter threatcat_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
3
# of downloads :
413
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Shipping Documents.exe
Verdict:
Suspicious activity
Analysis date:
2024-09-10 13:05:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Execution Generic Network Static Stealth Msil
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1508654 Sample: Shipping Documents.exe Startdate: 10/09/2024 Architecture: WINDOWS Score: 100 46 Sigma detected: Scheduled temp file as task from temp location 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected AntiVM3 2->50 52 7 other signatures 2->52 7 Shipping Documents.exe 7 2->7         started        11 QAagVbPcYJhgzf.exe 5 2->11         started        process3 file4 38 C:\Users\user\AppData\...\QAagVbPcYJhgzf.exe, PE32 7->38 dropped 40 C:\...\QAagVbPcYJhgzf.exe:Zone.Identifier, ASCII 7->40 dropped 42 C:\Users\user\AppData\Local\...\tmpD25B.tmp, XML 7->42 dropped 44 C:\Users\user\...\Shipping Documents.exe.log, ASCII 7->44 dropped 54 Adds a directory exclusion to Windows Defender 7->54 13 powershell.exe 23 7->13         started        16 schtasks.exe 1 7->16         started        18 vbc.exe 7->18         started        26 4 other processes 7->26 56 Multi AV Scanner detection for dropped file 11->56 58 Machine Learning detection for dropped file 11->58 20 schtasks.exe 1 11->20         started        22 vbc.exe 11->22         started        24 vbc.exe 11->24         started        28 3 other processes 11->28 signatures5 process6 signatures7 60 Loading BitLocker PowerShell Module 13->60 30 WmiPrvSE.exe 13->30         started        32 conhost.exe 13->32         started        34 conhost.exe 16->34         started        36 conhost.exe 20->36         started        process8
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2024-09-10 10:02:17 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Uses the VBS compiler for execution
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
928a3ed4c194379c46bce36c6ea2f603e8006cff91920c860d74b9eb02f0ccf7
MD5 hash:
e82f5b7d03ef6dfdf40c20c9b198736c
SHA1 hash:
5c7abd85c15b805cee21bec9af4e521453c06838
Detections:
win_formbook_g0 win_formbook_w0
SH256 hash:
2a38752dcc41d0da1f186dff724d5481747400d10c95957fbeb110c48c84cf56
MD5 hash:
4fd586104b9cc20080cb4540a57e1aef
SHA1 hash:
83b79a551bbcd970f896953f3d30e43cdc620062
SH256 hash:
7c7ae5661b2aa3d7bbee088e55c3cf37f1ec002ed88c7b312ad53ce1d090e150
MD5 hash:
a081970498ac3f9704c439711d0949de
SHA1 hash:
34900c04c98e2fcf227ee79715ed4edd32a16562
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
c59a72e874640d2d2c5669edc14fdeb82a72cbacde61679907d2926b8ed79d08
MD5 hash:
b37fc99b846edbde0d0f36bee1760849
SHA1 hash:
0016396b048dcbda5b87742c32678f706db6362c
SH256 hash:
70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0
MD5 hash:
e8c7d9168a273e2c2ddcdd8ae1248dab
SHA1 hash:
4ac1d56860e24c720169ea1ce96075d748de8937
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 70038b71f248dc262f64149d12a08c94e07a73e7bd72502b541a4dfb155446e0

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments