MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a08b93c63ec431feeda8394aea08bd894bf0b0f2fb82a4bb134e4ec8bad2e67e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: a08b93c63ec431feeda8394aea08bd894bf0b0f2fb82a4bb134e4ec8bad2e67e
SHA3-384 hash: 8f468c66f4968b01a57220a3be951f22878174a5ffb5876d439cd5a53f6bb64c364909c84bbc91371af256114da07217
SHA1 hash: 2a72639edb1527cdb51a2dc3dbcb249f4bdeb425
MD5 hash: 0e9ea37c3c7320871938a3f1942985b8
humanhash: football-timing-november-comet
File name:DHL Notification_pdf.exe
Download: download sample
Signature Formbook
File size:687'104 bytes
First seen:2022-11-17 07:08:55 UTC
Last seen:2022-11-17 08:39:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:DjcWB0GkH5rz6m5mObvwhYeIsYycXT4JKxqplMcAa7QAi7gicJpElqFyhS1NdoiV:Xbgh+m5m4whYeIsYBXTzYMcAabqfgpsE
TLSH T150E401BC37D51F22CAE896F9C893272007BAF98B25B1D3552FD451C28E40BE19945BCB
TrID 61.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.0% (.SCR) Windows screen saver (13097/50/3)
8.8% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
213
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DHL Notification_pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-11-17 07:11:54 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 748232 Sample: DHL Notification_pdf.exe Startdate: 17/11/2022 Architecture: WINDOWS Score: 100 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus detection for URL or domain 2->36 38 Multi AV Scanner detection for submitted file 2->38 40 9 other signatures 2->40 10 DHL Notification_pdf.exe 3 2->10         started        process3 file4 30 C:\Users\...\DHL Notification_pdf.exe.log, ASCII 10->30 dropped 50 Injects a PE file into a foreign processes 10->50 14 DHL Notification_pdf.exe 10->14         started        17 DHL Notification_pdf.exe 10->17         started        signatures5 process6 signatures7 52 Modifies the context of a thread in another process (thread injection) 14->52 54 Maps a DLL or memory area into another process 14->54 56 Sample uses process hollowing technique 14->56 58 Queues an APC in another process (thread injection) 14->58 19 explorer.exe 14->19 injected process8 dnsIp9 32 www.shop-izakaya-jin.com 162.43.117.52, 49716, 80 CYBERTRAILSUS United States 19->32 42 System process connects to network (likely due to code injection or exploit) 19->42 23 svchost.exe 19->23         started        signatures10 process11 signatures12 44 Modifies the context of a thread in another process (thread injection) 23->44 46 Maps a DLL or memory area into another process 23->46 48 Tries to detect virtualization through RDTSC time measurements 23->48 26 cmd.exe 1 23->26         started        process13 process14 28 conhost.exe 26->28         started       
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2022-11-17 02:43:10 UTC
File Type:
PE (.Net Exe)
AV detection:
23 of 40 (57.50%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:g28p rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
12971201b0c68b9106e80e12682fb6a5f76b2c848a50db6a2a0e4c0aa193753a
MD5 hash:
5ae9f6cee551cf8f9230eb5e81ee7a25
SHA1 hash:
8d2fa026eb3130888bb8279255db4c49a691bf52
Detections:
FormBook win_formbook_auto win_formbook_g0
Parent samples :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 hash:
8ec0afbd9860e1c42554de1443b6d56309a8d6f2752e5c014dff22db7c12434e
MD5 hash:
ef97cfba0690d30c4ed5c172f18448fe
SHA1 hash:
f191dbe865c248dade2616bfecb00dba1dedddc0
SH256 hash:
3b18c6db7aea56bac4796d440666d0fa39929e00c36ad129357c818e358c8daa
MD5 hash:
92c826fc0c6197a4be951fb51db94ad8
SHA1 hash:
c2c7405deb71db294c5e218a398c2bf0cb829448
SH256 hash:
f71c2360778211ff72d7109b1c208c1c33492c88e1d24580332fbb37baf7ae76
MD5 hash:
3ff0a66acc4635a7e950edbb8bde05a0
SHA1 hash:
ae7daf4801985a6d1a71ca89b52a59f80afcf7c6
SH256 hash:
cfc16a2dbb933b1b85807d48966e9301b9fc34f4c44e7357713ca88b54bf4ab4
MD5 hash:
aabd0bdc81026ade6c57383f21d5c227
SHA1 hash:
4b26936bb8c03be6d7963184215a5ab594ecb765
SH256 hash:
ab19f28c700d64814b0c55df868c30dfb94e0a1f9fb6f7bca05bac6eb78a4e52
MD5 hash:
1f2a6c02dcf9aa00a28a5039fb5b8ce0
SHA1 hash:
1ef480867d39b98368af7586a8e6ba38c0c3893a
SH256 hash:
a08b93c63ec431feeda8394aea08bd894bf0b0f2fb82a4bb134e4ec8bad2e67e
MD5 hash:
0e9ea37c3c7320871938a3f1942985b8
SHA1 hash:
2a72639edb1527cdb51a2dc3dbcb249f4bdeb425
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe a08b93c63ec431feeda8394aea08bd894bf0b0f2fb82a4bb134e4ec8bad2e67e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments