MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 25 File information Comments 1

SHA256 hash: 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251
SHA3-384 hash: df9af507f88bc7a64ffe5381459f59749de5429a55412ba2dcb4134a4e61c17b9cc8c07a83e78c37b453e60a1e4dda11
SHA1 hash: 189450a513d1f2412470eb965468f1324633d252
MD5 hash: f267a71692c3683e3d6d0461e003f54f
humanhash: iowa-steak-winter-paris
File name:f267a71692c3683e3d6d0461e003f54f
Download: download sample
Signature Formbook
File size:2'463'288 bytes
First seen:2024-04-07 07:30:26 UTC
Last seen:2024-04-07 08:31:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 49152:qjOIzFMNQnXmsIi7MS4bdotKHDG/GGcYsKYX78Y5Ye3:qjvzFMNQnWspj4bdot45GdsKYXl5Yo
Threatray 1'468 similar samples on MalwareBazaar
TLSH T1B8B5230E5BBE8136C7E8C3347940A547BBB2C76E98419B662C94CE358D273C2B54E4DE
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
263
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251.exe
Verdict:
Malicious activity
Analysis date:
2024-04-07 07:33:31 UTC
Tags:
evasion xworm remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file in the %AppData% directory
Launching a process
Creating a window
Enabling the 'hidden' option for recently created files
Connection attempt to an infection source
Moving a file to the Program Files subdirectory
Replacing files
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Creating a file in the mass storage device
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Enabling threat expansion on mass storage devices
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer, XWorm
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Protects its processes via BreakOnTermination flag
Sample uses string decryption to hide its real strings
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected PureLog Stealer
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1421511 Sample: ef8eruBP3b.exe Startdate: 07/04/2024 Architecture: WINDOWS Score: 100 51 gamemodz.duckdns.org 2->51 53 ip-api.com 2->53 55 bg.microsoft.map.fastly.net 2->55 65 Snort IDS alert for network traffic 2->65 67 Multi AV Scanner detection for domain / URL 2->67 69 Found malware configuration 2->69 71 24 other signatures 2->71 9 powershell.exe 2 15 2->9         started        12 ef8eruBP3b.exe 1 5 2->12         started        signatures3 process4 file5 73 Writes to foreign memory regions 9->73 75 Modifies the context of a thread in another process (thread injection) 9->75 77 Found suspicious powershell code related to unpacking or dynamic code loading 9->77 79 Injects a PE file into a foreign processes 9->79 15 dllhost.exe 1 9->15         started        18 conhost.exe 9->18         started        47 C:\Users\user\AppData\Local\Temp\$77dee67b, PE32 12->47 dropped 49 C:\Users\user\AppData\Local\Temp\$777d7189, PE32 12->49 dropped 81 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->81 20 $777d7189 17 7 12->20         started        24 $77dee67b 1 12->24         started        signatures6 process7 dnsIp8 91 Injects code into the Windows Explorer (explorer.exe) 15->91 93 Contains functionality to inject code into remote processes 15->93 95 Writes to foreign memory regions 15->95 103 3 other signatures 15->103 26 lsass.exe 15->26 injected 29 svchost.exe 15->29 injected 31 svchost.exe 15->31 injected 36 28 other processes 15->36 57 gamemodz.duckdns.org 45.128.96.133, 49702, 49720, 6969 XXLNETNL Germany 20->57 59 ip-api.com 208.95.112.1, 49701, 80 TUT-ASUS United States 20->59 45 C:\Users\user\AppData\Roaming\$777d7189, PE32 20->45 dropped 97 Multi AV Scanner detection for dropped file 20->97 99 Protects its processes via BreakOnTermination flag 20->99 101 Machine Learning detection for dropped file 20->101 105 4 other signatures 20->105 34 schtasks.exe 1 20->34         started        file9 signatures10 process11 dnsIp12 83 Installs new ROOT certificates 26->83 85 Writes to foreign memory regions 26->85 38 svchost.exe 26->38         started        41 svchost.exe 26->41 injected 87 System process connects to network (likely due to code injection or exploit) 29->87 63 gamemodz.duckdns.org 31->63 43 conhost.exe 34->43         started        signatures13 89 Uses dynamic DNS services 63->89 process14 dnsIp15 61 127.0.0.1 unknown unknown 38->61
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-04-07 07:31:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:hermeticwiper family:xworm family:zgrat bootkit persistence rat spyware stealer trojan upx wiper
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops autorun.inf file
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops desktop.ini file(s)
Looks up external IP address via web service
Writes to the Master Boot Record (MBR)
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Drops file in Drivers directory
Manipulates Digital Signatures
Contains code to disable Windows Defender
Detect HermeticWiper
Detect Xworm Payload
Detect ZGRat V1
HermeticWiper
Suspicious use of NtCreateUserProcessOtherParentProcess
Xworm
ZGRat
Malware Config
C2 Extraction:
gamemodz.duckdns.org:6969
Unpacked files
SH256 hash:
a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc
MD5 hash:
152e3f07bbaf88fb8b097ba05a60df6e
SHA1 hash:
c4638921bb140e7b6a722d7c4d88afa7ed4e55c8
SH256 hash:
4fe8bbdb5141c1be3c1e4960d1ba2aa49c0a3aa9b6e1316fccbe6f7bff7831ae
MD5 hash:
d9ea0a60267fdc954275906dadb48b80
SHA1 hash:
a4db8b34991d63cfcc4147cfe6538f840464091f
SH256 hash:
c6bd79861b5704a9479d4e2b7c0daec096936ac51dd785f7a5101a56d1b92c2a
MD5 hash:
73356909f4547e164a3713cfea019ca2
SHA1 hash:
a00ad368d7ceb751ab9f7f2692f1e437f300a5ca
SH256 hash:
dae4af52f26b686ee324bd40a692f889db9b6903301dfe9865fbc6ce597ce1f0
MD5 hash:
4b2391094263bc3572d5be7b9b2b60ca
SHA1 hash:
8ebb914a01437b967ca0c0d30a8c5d41e3749746
Detections:
XWorm MALWARE_Win_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT
SH256 hash:
7b425a1f4d946e11ebe709a583a4f220f6c1a4aaabdea159c0156b45cc23ab59
MD5 hash:
00e412d37a3167800ebaa2ab1b6892d7
SHA1 hash:
8afcd0e9002af549d22d8c40ff631a9b933c2951
SH256 hash:
91faa80bdc3ce1b7be3d4dded0b437ab74e7cac0c23f830957fd3b1f680c4fa5
MD5 hash:
760410e624197376e0d51cc81de67aad
SHA1 hash:
38c97928150c297f38d2d13abfd9148ccdac2fbd
SH256 hash:
3b54c961a0505792bee60c29c9291d10de69b4aa5dc73087c1b5925e367220d5
MD5 hash:
73830d482ada3f43ea48e59f5bf42f73
SHA1 hash:
063c90d61605be1f75f02e9e46bb04fa7449c6ab
SH256 hash:
74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251
MD5 hash:
f267a71692c3683e3d6d0461e003f54f
SHA1 hash:
189450a513d1f2412470eb965468f1324633d252
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:MALWARE_Win_R77
Author:ditekSHen
Description:Detects r77 rootkit
Rule name:MALWARE_Win_XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Rootkit_R77_be403e3c
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 74531f459fdb6837669583dc731b7a6afad5378782ab8bca5d726edac753f251

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments



Avatar
zbet commented on 2024-04-07 07:30:27 UTC

url : hxxp://168.138.211.88:8099/yCCoBn/Mayfro.exe