MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a5a473bc3d643ce300b72af75ae8f7a0d47ee983f1160707606ef9e818bb1a2f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 4 File information Comments

SHA256 hash: a5a473bc3d643ce300b72af75ae8f7a0d47ee983f1160707606ef9e818bb1a2f
SHA3-384 hash: 900018ac9fe938294f9d8b68ce512d84062807a079aabb3e562a11758a0ef3ab24b65ceae81895feac74ba09063cd9ed
SHA1 hash: 6cb5e6d9d7eb76993064c8b36465fcd47fc14d11
MD5 hash: 027ac6bf381a0b5d842c137e2240624c
humanhash: fix-mobile-coffee-michigan
File name:LF2024022.exe
Download: download sample
Signature Formbook
File size:644'096 bytes
First seen:2024-04-28 09:22:02 UTC
Last seen:2024-04-28 10:35:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'738 x AgentTesla, 19'596 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:uNgLeFR6rXlv312Z3vBr+nIUcos1N7PCwSw6Z:VXJ312ZvBgIUcF7PN
Threatray 615 similar samples on MalwareBazaar
TLSH T15CD4122231EA0802D27D7FB644B50A191378F90A5D72C3CD5F9A29CFC5C2B49EB65B1B
TrID 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.1% (.SCR) Windows screen saver (13097/50/3)
8.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon ccd444444444d4d4 (6 x Formbook, 4 x AgentTesla)
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
286
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a5a473bc3d643ce300b72af75ae8f7a0d47ee983f1160707606ef9e818bb1a2f.exe
Verdict:
Malicious activity
Analysis date:
2024-04-28 09:40:05 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Launching cmd.exe command interpreter
Setting browser functions hooks
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected FormBook
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432835 Sample: LF2024022.exe Startdate: 28/04/2024 Architecture: WINDOWS Score: 100 78 www.usapubpong.com 2->78 80 www.tldrparent.com 2->80 82 24 other IPs or domains 2->82 90 Snort IDS alert for network traffic 2->90 92 Found malware configuration 2->92 94 Malicious sample detected (through community Yara rule) 2->94 96 10 other signatures 2->96 11 LF2024022.exe 7 2->11         started        15 NZdJojwPG.exe 5 2->15         started        17 chrome.exe 9 2->17         started        signatures3 process4 dnsIp5 62 C:\Users\user\AppData\Roaming62ZdJojwPG.exe, PE32 11->62 dropped 64 C:\Users\user\AppData\Local\...\tmp2C47.tmp, XML 11->64 dropped 108 Uses schtasks.exe or at.exe to add and modify task schedules 11->108 110 Adds a directory exclusion to Windows Defender 11->110 112 Tries to detect virtualization through RDTSC time measurements 11->112 20 LF2024022.exe 11->20         started        23 powershell.exe 23 11->23         started        25 schtasks.exe 1 11->25         started        114 Multi AV Scanner detection for dropped file 15->114 116 Machine Learning detection for dropped file 15->116 118 Injects a PE file into a foreign processes 15->118 27 NZdJojwPG.exe 15->27         started        29 schtasks.exe 15->29         started        31 NZdJojwPG.exe 15->31         started        66 192.168.2.5, 138, 443, 49703 unknown unknown 17->66 68 192.168.2.4 unknown unknown 17->68 70 3 other IPs or domains 17->70 33 chrome.exe 17->33         started        file6 signatures7 process8 dnsIp9 98 Modifies the context of a thread in another process (thread injection) 20->98 100 Maps a DLL or memory area into another process 20->100 102 Sample uses process hollowing technique 20->102 104 Queues an APC in another process (thread injection) 20->104 36 explorer.exe 104 4 20->36 injected 106 Loading BitLocker PowerShell Module 23->106 39 conhost.exe 23->39         started        41 WmiPrvSE.exe 23->41         started        43 conhost.exe 25->43         started        45 conhost.exe 29->45         started        72 www.google.com 142.251.111.106, 443, 49707, 49711 GOOGLEUS United States 33->72 74 172.253.115.101, 443, 49749 GOOGLEUS United States 33->74 76 5 other IPs or domains 33->76 signatures10 process11 dnsIp12 84 www.johnasian.com 15.197.240.20, 49747, 49775, 80 TANDEMUS United States 36->84 86 salahtimeonline.com 208.91.199.7, 49750, 80 PUBLIC-DOMAIN-REGISTRYUS United States 36->86 88 5 other IPs or domains 36->88 47 help.exe 36->47         started        50 help.exe 36->50         started        process13 signatures14 120 Modifies the context of a thread in another process (thread injection) 47->120 122 Maps a DLL or memory area into another process 47->122 124 Tries to detect virtualization through RDTSC time measurements 47->124 52 cmd.exe 47->52         started        54 chrome.exe 47->54 injected 56 chrome.exe 47->56 injected 58 5 other processes 47->58 process15 process16 60 conhost.exe 52->60         started       
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2024-04-24 03:03:19 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
24 of 38 (63.16%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:jn17 rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Deletes itself
Formbook payload
Formbook
Unpacked files
SH256 hash:
88f2105a6e7aab073776db334144ab1b46c99b52739883163b77b384a1304d16
MD5 hash:
3ffc8687e774e137b005b450bf8fee2e
SHA1 hash:
18a20385f5b69d83001f1a1dfe477fd42d3765b0
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0 Formbook
SH256 hash:
1c633f39a192f108f755e0bcf412e8489ad80781f3b7807c80892deb2526ff0d
MD5 hash:
e4b5d57e9e46a4e76075b5b92f71577f
SHA1 hash:
d76dc165724148193c6911cc75fc62c198737d3a
SH256 hash:
a3de65d9607fa28995b6d60b0ad501d36107454865c7a74e8121ec11320ae565
MD5 hash:
7dfefede4d4b4d15fe2c4d83996e9e1a
SHA1 hash:
62e0258f0a8d23d17225ff7ad0b304ab12a9fd6a
SH256 hash:
c4be7d4edf673a66cbb495f29963ac11d6469ca7c89883ff7dd70069bfb84465
MD5 hash:
81efc8e6290812cada61853f24311517
SHA1 hash:
3111eb84e0e108e6bfb8dd2280f1a66bdb1ab394
SH256 hash:
a5a473bc3d643ce300b72af75ae8f7a0d47ee983f1160707606ef9e818bb1a2f
MD5 hash:
027ac6bf381a0b5d842c137e2240624c
SHA1 hash:
6cb5e6d9d7eb76993064c8b36465fcd47fc14d11
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments