MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a6f25510b6ad94bc18be6ea38eca643236fc194050516df66cafc93859079f63. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 17
| SHA256 hash: | a6f25510b6ad94bc18be6ea38eca643236fc194050516df66cafc93859079f63 |
|---|---|
| SHA3-384 hash: | 539088ea8838a6c80a41e6c77b850e40170dccab3d76a7c2314c74246aa35e0045ea52e74c61a8f92b8c3f8df572756e |
| SHA1 hash: | 3e45224d1f0e65c09f741a83591633011b3c0ee0 |
| MD5 hash: | dc43665b900f0f30bee8aca7505a4c08 |
| humanhash: | carpet-lima-arkansas-mockingbird |
| File name: | PURCHASE ORDER_xl.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'359'360 bytes |
| First seen: | 2024-10-30 13:48:17 UTC |
| Last seen: | 2024-11-01 04:22:06 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 948cc502fe9226992dce9417f952fce3 (1'182 x CredentialFlusher, 446 x Formbook, 231 x AgentTesla) |
| ssdeep | 24576:cqDEvCTbMWu7rQYlBQcBiT6rprG8awE4lEyDH3gVyeqaGXtVVo:cTvC/MTQYxsWR7awoyDH3gselGXt/ |
| TLSH | T16955C0027391C062FF9B92334F5AF6515ABC79260123E62F13981DBABD701B1563E7A3 |
| TrID | 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 12.5% (.EXE) Win64 Executable (generic) (10522/11/4) 6.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.4% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | exe FormBook |
Intelligence
File Origin
PLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | pe_detect_tls_callbacks |
|---|
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.