MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8206e029f0266ea051b039afc8b9427f70079ee9d9ba4cb7cacd9f944fd2e9c2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 8206e029f0266ea051b039afc8b9427f70079ee9d9ba4cb7cacd9f944fd2e9c2
SHA3-384 hash: da14859e819c0dbc208cbeb7b6157a5890cd0eddd23e67366a0b1ac1af9ee886f36a15bc38d75ec336645cec16fbaf02
SHA1 hash: d8c0caf793b78713ac02dcd09e0e326d6bd45b18
MD5 hash: 5d0704142349c70304df4a3e2a401d6b
humanhash: golf-eight-neptune-robert
File name:DHL Notification_pdf.exe
Download: download sample
Signature Formbook
File size:585'728 bytes
First seen:2022-10-28 09:29:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'654 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 12288:th7vEV0mHpuSvMvEahAaWP7IneAdvB3RwkdK0t95/KLEyLONLb/:kPTaGknvvB3Rwko0P52EyLO
TLSH T1F2C412A8760071AFC967E9B6CD4D0DA4FE1168F653AB8303A4D326EC8D5D94BDE050F2
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f4f4ac8cacacd4d4 (85 x Heodo, 11 x Formbook, 10 x SnakeKeylogger)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
257
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DHL Notification_pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-10-28 09:55:12 UTC
Tags:
formbook trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Creating a file
Searching for synchronization primitives
Сreating synchronization primitives
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 732956 Sample: DHL Notification_pdf.exe Startdate: 28/10/2022 Architecture: WINDOWS Score: 100 37 Malicious sample detected (through community Yara rule) 2->37 39 Antivirus detection for URL or domain 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 9 other signatures 2->43 10 DHL Notification_pdf.exe 3 2->10         started        process3 file4 27 C:\Users\...\DHL Notification_pdf.exe.log, CSV 10->27 dropped 13 DHL Notification_pdf.exe 10->13         started        process5 signatures6 51 Modifies the context of a thread in another process (thread injection) 13->51 53 Maps a DLL or memory area into another process 13->53 55 Sample uses process hollowing technique 13->55 57 Queues an APC in another process (thread injection) 13->57 16 explorer.exe 13->16 injected process7 dnsIp8 29 todotutoriales10.com 149.202.147.247, 49699, 80 OVHFR France 16->29 31 www.todotutoriales10.com 16->31 33 www.infidelitytoolkit.com 16->33 35 System process connects to network (likely due to code injection or exploit) 16->35 20 WWAHost.exe 16->20         started        signatures9 process10 signatures11 45 Modifies the context of a thread in another process (thread injection) 20->45 47 Maps a DLL or memory area into another process 20->47 49 Tries to detect virtualization through RDTSC time measurements 20->49 23 cmd.exe 1 20->23         started        process12 process13 25 conhost.exe 23->25         started       
Threat name:
Win32.Spyware.SnakeLogger
Status:
Malicious
First seen:
2022-10-28 07:48:46 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
19 of 26 (73.08%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:g28p rat spyware stealer trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook payload
Formbook
Gathering data
Unpacked files
SH256 hash:
12971201b0c68b9106e80e12682fb6a5f76b2c848a50db6a2a0e4c0aa193753a
MD5 hash:
5ae9f6cee551cf8f9230eb5e81ee7a25
SHA1 hash:
8d2fa026eb3130888bb8279255db4c49a691bf52
Detections:
FormBook win_formbook_auto win_formbook_g0
Parent samples :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 hash:
ef4126cf5329148393e89edd04c1fd87b1ada37d76618fe38cf168f6f48c8549
MD5 hash:
fff5b6af2fc22562093dd1bd3f5348d7
SHA1 hash:
9ac92a64db981f0e9494d6435de7ecd32aa526df
SH256 hash:
248a7c4997aacb14ca032daf9668636839f921d0a3403f09a3b0ccfdc948cbf1
MD5 hash:
a7952169b04a2c6a39661aad59e79dcf
SHA1 hash:
88722f1a32c913307c0c6385b04478a79fabd12b
SH256 hash:
7f272c4db499b1501a5ea1711d23de0e6a0c07faf16275e9b01722dae889c7c9
MD5 hash:
dd8b9511dda8eb7c84e1621046828883
SHA1 hash:
7f715270ffcadcba5c3148d2a0cecfaaf6c2e805
SH256 hash:
d30167eceb516ced3dbf90996ea07426afcf61a74344513b573a052733c663d0
MD5 hash:
623df2e74fbfe26e20accfc35ef91ed6
SHA1 hash:
4594101ad3769d35cc86f48eb0c9bbd37d11642e
SH256 hash:
8206e029f0266ea051b039afc8b9427f70079ee9d9ba4cb7cacd9f944fd2e9c2
MD5 hash:
5d0704142349c70304df4a3e2a401d6b
SHA1 hash:
d8c0caf793b78713ac02dcd09e0e326d6bd45b18
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments