MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 77194b668ce640225df0d876e991d58dc8c08e809474cd21abe5dc030857cb10. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments 1

SHA256 hash: 77194b668ce640225df0d876e991d58dc8c08e809474cd21abe5dc030857cb10
SHA3-384 hash: 3e59affa48b4d3139a1c43fb60dbe65a8b731e9e160f518e7a42b449ebf69bf05c25420b675a6467ff1548eaac67ff9a
SHA1 hash: a6803950285eb446fc57d9722507816731ec93f6
MD5 hash: 13a237b2f7042de8f7585c54d2432b6c
humanhash: football-cat-artist-beryllium
File name:13a237b2f7042de8f7585c54d2432b6c
Download: download sample
Signature Formbook
File size:892'416 bytes
First seen:2023-03-17 04:55:22 UTC
Last seen:2023-03-17 07:29:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:hzCmBMpjkjXyuaqPMQK4bUyicmpOwKgkf6QktWivF1HxjqQBxK9i/v8:pcjkj+eMYPivO5f5kWSjpqQBxJ0
Threatray 200 similar samples on MalwareBazaar
TLSH T121151249BB29DB21C2BE87FE7476701193F3845F622AE3485CCF64EE7A62F510501A4B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon f0c4f4c4dcdcdcf8 (8 x AgentTesla, 6 x SnakeKeylogger, 2 x Formbook)
Reporter zbetcheckin
Tags:32 exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
13a237b2f7042de8f7585c54d2432b6c
Verdict:
Malicious activity
Analysis date:
2023-03-17 04:58:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching a process
Creating a process with a hidden window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 828417 Sample: 8ExXjPtCS8.exe Startdate: 17/03/2023 Architecture: WINDOWS Score: 100 51 www.dealsharp.site 2->51 59 Snort IDS alert for network traffic 2->59 61 Multi AV Scanner detection for domain / URL 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 5 other signatures 2->65 9 8ExXjPtCS8.exe 7 2->9         started        13 jqjUZreDBHg.exe 5 2->13         started        signatures3 process4 file5 43 C:\Users\user\AppData\...\jqjUZreDBHg.exe, PE32 9->43 dropped 45 C:\Users\...\jqjUZreDBHg.exe:Zone.Identifier, ASCII 9->45 dropped 47 C:\Users\user\AppData\Local\...\tmp805B.tmp, XML 9->47 dropped 49 C:\Users\user\AppData\...\8ExXjPtCS8.exe.log, ASCII 9->49 dropped 75 Uses schtasks.exe or at.exe to add and modify task schedules 9->75 77 Adds a directory exclusion to Windows Defender 9->77 15 8ExXjPtCS8.exe 9->15         started        18 powershell.exe 21 9->18         started        20 schtasks.exe 1 9->20         started        79 Multi AV Scanner detection for dropped file 13->79 81 Machine Learning detection for dropped file 13->81 83 Injects a PE file into a foreign processes 13->83 22 jqjUZreDBHg.exe 13->22         started        24 schtasks.exe 1 13->24         started        26 jqjUZreDBHg.exe 13->26         started        signatures6 process7 signatures8 87 Modifies the context of a thread in another process (thread injection) 15->87 89 Maps a DLL or memory area into another process 15->89 91 Sample uses process hollowing technique 15->91 93 Queues an APC in another process (thread injection) 15->93 28 explorer.exe 1 15->28 injected 32 conhost.exe 18->32         started        34 conhost.exe 20->34         started        36 conhost.exe 24->36         started        process9 dnsIp10 53 www.cmproutdoors.com 156.255.170.114, 49705, 49706, 80 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 28->53 55 lokoua.com 83.229.19.64, 49696, 80 SKYVISIONGB United Kingdom 28->55 57 11 other IPs or domains 28->57 85 System process connects to network (likely due to code injection or exploit) 28->85 38 wlanext.exe 13 28->38         started        41 svchost.exe 28->41         started        signatures11 process12 signatures13 67 Tries to steal Mail credentials (via file / registry access) 38->67 69 Tries to harvest and steal browser information (history, passwords, etc) 38->69 71 Modifies the context of a thread in another process (thread injection) 38->71 73 Maps a DLL or memory area into another process 38->73
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-03-17 04:56:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
25
AV detection:
10 of 21 (47.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Unpacked files
SH256 hash:
5546b796e9f2cd13e3dbc9dd2b88fbaecd87860b3141bf09a5ebc7c317772774
MD5 hash:
666790b9763027ad86c9643614e7eb91
SHA1 hash:
c2a75f9097ee4be0bd7b97ad805fc6a7155f86f1
Detections:
win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
d6800f1a77ab727bd6c451d8d988d5d13d11ee42679051c8875e71842d0c4018
MD5 hash:
dae26f805251765b8585b73e71b5ed5f
SHA1 hash:
002be915573fc8ab6a8c97057bcf4a5927f16243
SH256 hash:
180032af43a369836ee4cb9cd8c16e87215350affe632f9d7aa2f24f73b6f6a1
MD5 hash:
07df70a11fb8dc512d3e825da412ce96
SHA1 hash:
ffcbd77e63fcea9a53c8d4b8fc500632ca0c9dbc
SH256 hash:
f57ce3daaa4f9824237c357457701324d3501525ce2464f72bed73f081e55732
MD5 hash:
257023f77566e7d8d4e411e265d172f3
SHA1 hash:
d7b88c298c1fefe7188cdc79d7d15c73ffa1e46f
SH256 hash:
6204a14c8aadde99da956785c7efa57b3d9f2ecac260af20b700086b8d42e012
MD5 hash:
f750eb9ee8102ed61aa7a08910d8fc52
SHA1 hash:
9aed92bc5018d465a76643e9b0664e3516b73027
SH256 hash:
d06df7395d561e198f9b7c5481567116ff2e4c2e84437c018d2a2c8ea6c4ca37
MD5 hash:
0fb6061f7d37424fb9e6d0e76b019c19
SHA1 hash:
98a64bf7b459f032d6ec5793003bf61b5ae1dd74
SH256 hash:
77194b668ce640225df0d876e991d58dc8c08e809474cd21abe5dc030857cb10
MD5 hash:
13a237b2f7042de8f7585c54d2432b6c
SHA1 hash:
a6803950285eb446fc57d9722507816731ec93f6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 77194b668ce640225df0d876e991d58dc8c08e809474cd21abe5dc030857cb10

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-03-17 04:55:29 UTC

url : hxxp://172.245.191.19/708/vbc.exe