MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9bd6ff186abaaa8ad5ba8e89d2f12c87ea5fdac36e14af8192ad43655a90a972. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 9bd6ff186abaaa8ad5ba8e89d2f12c87ea5fdac36e14af8192ad43655a90a972
SHA3-384 hash: 2f66b582de7303b79a3a8ff5f7ebf49bae495091146981df8f09b360749b6b71a23160374fe7e674e40e772ce0856bd3
SHA1 hash: 621178e09718f892a7e8fd86da65963908fed565
MD5 hash: 29776aefed6bc1ea53c2bb85a0d328c6
humanhash: harry-timing-wisconsin-arizona
File name:Maynew-order #Brazil-05011.exe
Download: download sample
Signature Formbook
File size:640'000 bytes
First seen:2023-05-15 07:26:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:cqUTmfMYMlNZT/LVGFOQDD9v487+Rms33lmQPwDhYJ5:eTmMlxGFOQDhkRfVaVYJ
Threatray 2'856 similar samples on MalwareBazaar
TLSH T105D4CF89123BBFE2D9A917F0211434424B7DA11A75F8F0FC6D9BB4C9C89AB104BD4B67
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter threatcat_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
235
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Maynew-order #Brazil-05011.exe
Verdict:
Suspicious activity
Analysis date:
2023-05-15 07:29:08 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys comodo lokibot packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 866459 Sample: Maynew-order_#Brazil-05011.exe Startdate: 15/05/2023 Architecture: WINDOWS Score: 100 31 www.fzjinyebz.com 2->31 37 Snort IDS alert for network traffic 2->37 39 Found malware configuration 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 8 other signatures 2->43 11 Maynew-order_#Brazil-05011.exe 3 2->11         started        signatures3 process4 file5 29 C:\...\Maynew-order_#Brazil-05011.exe.log, ASCII 11->29 dropped 55 Tries to detect virtualization through RDTSC time measurements 11->55 57 Injects a PE file into a foreign processes 11->57 15 Maynew-order_#Brazil-05011.exe 11->15         started        signatures6 process7 signatures8 59 Modifies the context of a thread in another process (thread injection) 15->59 61 Maps a DLL or memory area into another process 15->61 63 Sample uses process hollowing technique 15->63 65 Queues an APC in another process (thread injection) 15->65 18 explorer.exe 3 1 15->18 injected process9 dnsIp10 33 www.kevinaccorinti.com 35.214.156.121, 49707, 80 GOOGLE-2US United States 18->33 35 www.drx72.com 122.10.4.13, 49708, 80 DXTL-HKDXTLTseungKwanOServiceHK Hong Kong 18->35 45 System process connects to network (likely due to code injection or exploit) 18->45 47 Uses netsh to modify the Windows network and firewall settings 18->47 22 netsh.exe 18->22         started        signatures11 process12 signatures13 49 Modifies the context of a thread in another process (thread injection) 22->49 51 Maps a DLL or memory area into another process 22->51 53 Tries to detect virtualization through RDTSC time measurements 22->53 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2023-05-11 08:52:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:ca82 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Unpacked files
SH256 hash:
8311241acff882f99b7e5fea6e60ea51b818ad98fa82f679a2babefd5fe88ea7
MD5 hash:
87c24ad552f13f186c254e420ff417a8
SHA1 hash:
fe0fe2afaacd7306057777a0e9ea1b1e396b9c97
SH256 hash:
3ab1dcc37e7c5c643bf41e9f0f81f816f24974fbddde95e2af52426e3374dd35
MD5 hash:
8a2c496875c0871aecc16aae768b323f
SHA1 hash:
f5423a32125c70b512de301c5616c7b75477e2e7
SH256 hash:
3161d4070cf1986605804b7a6c829cc470d282d9b67fa5bfc774cb42b8f1d55c
MD5 hash:
266ff259db543fbc0bd0d7a7c5294f33
SHA1 hash:
460564fc4e902de0eb4822b7e1d356514cd161ae
SH256 hash:
b52c29ba9ef8996bdf721950d900db96f1befb9883eb38c2075528e60c7aabd4
MD5 hash:
7b6143d9d94c8b80d191b77d8b6d1ba2
SHA1 hash:
1c91704ff6da2a9dd8aaa2ff2d5a5f69a445f76b
SH256 hash:
9bd6ff186abaaa8ad5ba8e89d2f12c87ea5fdac36e14af8192ad43655a90a972
MD5 hash:
29776aefed6bc1ea53c2bb85a0d328c6
SHA1 hash:
621178e09718f892a7e8fd86da65963908fed565
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 9bd6ff186abaaa8ad5ba8e89d2f12c87ea5fdac36e14af8192ad43655a90a972

(this sample)

  
Dropped by
formbook
  
Delivery method
Distributed via e-mail attachment

Comments