MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9296272090597bd4d2723682f9ab6923356efad185125ad318eb778637b36cff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 9296272090597bd4d2723682f9ab6923356efad185125ad318eb778637b36cff
SHA3-384 hash: be3ce23bf47772da0599efb284088067d1565aeaecb02e729bdf8dc3dd340a5424a9413e7a4c74db49d28955f2564edf
SHA1 hash: 6eabbe0e5a7aa657101d39979e44a9457a912cae
MD5 hash: 0f2bccedebf25e9f665b2e07064f307d
humanhash: ink-aspen-jupiter-beryllium
File name:invoice.exe
Download: download sample
Signature Formbook
File size:723'456 bytes
First seen:2023-05-16 10:20:58 UTC
Last seen:2023-05-17 02:20:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'454 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:c+QX06XlJMsJxxbt0ex4qbgAecAMr8ql42L/mjYbnzP3qiQ8ljQ:F363dDge5ekr8OjmjMDqOU
Threatray 2'886 similar samples on MalwareBazaar
TLSH T1E5F4BF5022649B92D3B947FA5134091003BA3A963D3FE3689FEF20CBA663F475A54F17
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
10
# of downloads :
239
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
invoice.exe
Verdict:
Malicious activity
Analysis date:
2023-05-16 10:23:53 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Creating a process with a hidden window
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
comodo crypter packed phishing
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Scheduled temp file as task from temp location
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 867704 Sample: invoice.exe Startdate: 16/05/2023 Architecture: WINDOWS Score: 100 58 www.ebcbank.net 2->58 60 www.byseymanur.com 2->60 62 2 other IPs or domains 2->62 80 Found malware configuration 2->80 82 Malicious sample detected (through community Yara rule) 2->82 84 Antivirus detection for URL or domain 2->84 86 8 other signatures 2->86 11 invoice.exe 7 2->11         started        15 gsgPZHHNsTjl.exe 5 2->15         started        signatures3 process4 dnsIp5 50 C:\Users\user\AppData\...\gsgPZHHNsTjl.exe, PE32 11->50 dropped 52 C:\Users\...\gsgPZHHNsTjl.exe:Zone.Identifier, ASCII 11->52 dropped 54 C:\Users\user\AppData\Local\...\tmp3B2D.tmp, XML 11->54 dropped 56 C:\Users\user\AppData\...\invoice.exe.log, ASCII 11->56 dropped 94 Uses schtasks.exe or at.exe to add and modify task schedules 11->94 96 Adds a directory exclusion to Windows Defender 11->96 18 RegSvcs.exe 11->18         started        21 powershell.exe 21 11->21         started        23 schtasks.exe 1 11->23         started        70 192.168.2.1 unknown unknown 15->70 98 Multi AV Scanner detection for dropped file 15->98 100 Machine Learning detection for dropped file 15->100 25 RegSvcs.exe 15->25         started        27 schtasks.exe 1 15->27         started        file6 signatures7 process8 signatures9 72 Modifies the context of a thread in another process (thread injection) 18->72 74 Maps a DLL or memory area into another process 18->74 76 Sample uses process hollowing technique 18->76 78 2 other signatures 18->78 29 explorer.exe 3 6 18->29 injected 33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        37 conhost.exe 27->37         started        process10 dnsIp11 64 td-ccm-168-233.wixdns.net 34.117.168.233, 49701, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 29->64 66 www.art2z.com 29->66 68 2 other IPs or domains 29->68 102 System process connects to network (likely due to code injection or exploit) 29->102 39 chkdsk.exe 29->39         started        42 cmstp.exe 29->42         started        44 autochk.exe 29->44         started        signatures12 process13 signatures14 88 Modifies the context of a thread in another process (thread injection) 39->88 90 Maps a DLL or memory area into another process 39->90 92 Tries to detect virtualization through RDTSC time measurements 39->92 46 cmd.exe 1 39->46         started        process15 process16 48 conhost.exe 46->48         started       
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-05-15 19:07:29 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:m82 rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Formbook payload
Formbook
Unpacked files
SH256 hash:
76f9c3ed177a98a5397d5507ce7efbafed0c55553ce00dec171891c54a35db77
MD5 hash:
d090b96080246effb57d59eba08ce4c8
SHA1 hash:
b77aa76796ff76824ce7c7ca4cf11378888f1d44
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0
Parent samples :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 hash:
6adc65670a19c04a600bd5b429cf3dd2669ecd6b96e7d660674a13156866b192
MD5 hash:
91cfc38181cd621442dad19367d44ab9
SHA1 hash:
c0af340366ceed579358ad08399dd98896435cd1
SH256 hash:
65c3db1bb19c7be06c7fd1b5edbb74be1ddc57e3ad2a7690e0d4cbe133138ae5
MD5 hash:
3666d76b5d637f587aaffac7204611ac
SHA1 hash:
7dbb4883562d67fc58c658c9542f6448a7791a4f
SH256 hash:
1329c9df1c559ef824838bce8da9c850404b9b0d8d4096e9b87d1355be2d9287
MD5 hash:
1b82a7d2871132c945b91490b9eecb80
SHA1 hash:
42199698f174419ec55056e23399636eeaa5d3fe
SH256 hash:
6722a58c81f6d11004e880bd8481acc423bf96afd46bf692f1562cfa4c5852bd
MD5 hash:
d92d2ba953be4be2d6f2bc859ec5c607
SHA1 hash:
05da51752277bd907ebcfb799524ec7655abbc3a
SH256 hash:
9296272090597bd4d2723682f9ab6923356efad185125ad318eb778637b36cff
MD5 hash:
0f2bccedebf25e9f665b2e07064f307d
SHA1 hash:
6eabbe0e5a7aa657101d39979e44a9457a912cae
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments