MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 814f2e3ff651afd0a82fe2b2c953c27e8ffda9df3fd7232681da30d29573271f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 17


Intelligence 17 IOCs YARA 1 File information Comments 1

SHA256 hash: 814f2e3ff651afd0a82fe2b2c953c27e8ffda9df3fd7232681da30d29573271f
SHA3-384 hash: 82120ad638735dc861ddf68fffc4407817e65453928b27146b2c4235bc9c10a9e6c89ae0779cccdd5ca5695b37160785
SHA1 hash: 649e1dfc24e2e2d661b29f889c058c55913ff697
MD5 hash: 0fc7044f136f4274cc856db51c53a038
humanhash: april-washington-utah-island
File name:0fc7044f136f4274cc856db51c53a038
Download: download sample
Signature Formbook
File size:1'371'680 bytes
First seen:2022-05-23 07:48:42 UTC
Last seen:2022-05-23 08:40:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3ec3dfdccc2e2dd2d4c62887f00d1d00 (3 x Formbook)
ssdeep 24576:8tNZmU6UBE9Uyi4q56oA9AdrUi6HOY7cbp6Uy:8TZB6UBE9U6adrUifScx
TLSH T1F25512E079D0D0A5D4AB97314874CAD0FAA5A9E9C8BC412F3339A72C5E233D1D4B1F96
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9b2565696965293f (3 x Formbook)
Reporter zbetcheckin
Tags:32 exe FormBook signed

Code Signing Certificate

Organisation:livecode.com
Issuer:cPanel, Inc. Certification Authority
Algorithm:sha256WithRSAEncryption
Valid from:2022-03-29T00:00:00Z
Valid to:2022-06-27T23:59:59Z
Serial number: 5c37e321f7fa9d7df439d21b78b11e64
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: aff73caca92a93fb3eb9461be530cfd176d4f5d2b9062ef76c321e98f772fc76
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
272
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
0fc7044f136f4274cc856db51c53a038
Verdict:
Malicious activity
Analysis date:
2022-05-23 07:59:48 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Сreating synchronization primitives
Searching for synchronization primitives
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 632102 Sample: NUo7j5g70U Startdate: 23/05/2022 Architecture: WINDOWS Score: 100 28 Found malware configuration 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus detection for URL or domain 2->32 34 5 other signatures 2->34 9 NUo7j5g70U.exe 2->9         started        process3 signatures4 36 Writes to foreign memory regions 9->36 38 Allocates memory in foreign processes 9->38 40 Injects a PE file into a foreign processes 9->40 12 InstallUtil.exe 9->12         started        process5 signatures6 42 Modifies the context of a thread in another process (thread injection) 12->42 44 Maps a DLL or memory area into another process 12->44 46 Sample uses process hollowing technique 12->46 48 2 other signatures 12->48 15 chkdsk.exe 12->15         started        18 explorer.exe 12->18 injected process7 signatures8 50 Tries to detect virtualization through RDTSC time measurements 15->50 20 cmd.exe 1 15->20         started        22 autoconv.exe 18->22         started        24 autofmt.exe 18->24         started        process9 process10 26 conhost.exe 20->26         started       
Threat name:
Win32.Spyware.Noon
Status:
Malicious
First seen:
2022-05-23 07:49:17 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
22 of 26 (84.62%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:xloader campaign:uu0p loader persistence rat spyware stealer suricata
Behaviour
Gathers network information
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Reads user/profile data of web browsers
Adds policy Run key to start application
Xloader Payload
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
050a5cfb127a824e03b0dd1c5cd8d67509544f43d82e0bef2e0c25b0763636ec
MD5 hash:
513c24a805fe1edb6e6cf86ccad70660
SHA1 hash:
c799f52c3d853d768164551b4526806eae757788
Detections:
win_formbook_g0 win_formbook_auto
SH256 hash:
c24249b324a728136df741a66e8aa85750d216ca6ae0517faf01161c2a146514
MD5 hash:
e7e0180ea40db293b704d69c671c063b
SHA1 hash:
19c97bfc689893ddb0e39de5ced1b52f31b0d677
SH256 hash:
c343eac023e936c80861c36071f1017ebaf18c4ca8c6286254d39f4308bb92fb
MD5 hash:
e0587f68e1662bf71ce32a2d2463c7b6
SHA1 hash:
23f13a12236e49e4af68c6673a094386772e8be0
SH256 hash:
814f2e3ff651afd0a82fe2b2c953c27e8ffda9df3fd7232681da30d29573271f
MD5 hash:
0fc7044f136f4274cc856db51c53a038
SHA1 hash:
649e1dfc24e2e2d661b29f889c058c55913ff697
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe 814f2e3ff651afd0a82fe2b2c953c27e8ffda9df3fd7232681da30d29573271f

(this sample)

Comments



Avatar
zbet commented on 2022-05-23 07:48:45 UTC

url : hxxps://180.214.236.4/cloudprotect/vbc.exe