MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a9731f99c6a49a98e6ecc244f7fc6b4263be8255559a883c58e154bb9be68b44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | a9731f99c6a49a98e6ecc244f7fc6b4263be8255559a883c58e154bb9be68b44 |
|---|---|
| SHA3-384 hash: | acb71a80089ad3c32fa68ddca6725ce1a1a0e39b2eb0390f87a5a0766ba606990b1092229a9615bdb42d7aac662ea79c |
| SHA1 hash: | 28132f77cef05d22f912541f4fddf645c60b65cb |
| MD5 hash: | 7c5b255f8adfbdbc610be41f154f8448 |
| humanhash: | eighteen-pennsylvania-kilo-two |
| File name: | DHL Notification_pdf.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 399'475 bytes |
| First seen: | 2022-10-19 06:05:44 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 56a78d55f3f7af51443e58e0ce2fb5f6 (720 x GuLoader, 451 x Formbook, 295 x Loki) |
| ssdeep | 6144:wbE/HUlTKu1gRtv6cWGdvY1YGoQKwBRiyjOavu/MmbehZ40MSWN7Nj66ZG8:wbwv6cxdv05fmavNmbehZ4uWPO648 |
| TLSH | T1F884AE54D5089ED6E202B238E1F8FF1D1A108FA6726EAB48D531B941BC727CF6436D8D |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 9f197f3767531b47 (39 x Formbook, 12 x AgentTesla, 2 x RemcosRAT) |
| Reporter | |
| Tags: | DHL exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
210
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DHL Notification_pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-10-19 06:26:29 UTC
Tags:
formbook trojan stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching the default Windows debugger (dwwin.exe)
Searching for synchronization primitives
Launching a process
Сreating synchronization primitives
Launching cmd.exe command interpreter
Sending a custom TCP request
Setting browser functions hooks
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Found hidden mapped module (file has been removed from disk)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-10-18 13:16:47 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
14 of 26 (53.85%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:g2e8 rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
72f7272d0e8af849c87030cb8b6ce362ef9896400be3ef27e56970f21cd8b691
MD5 hash:
b238075b563644dcd4566f6810971c75
SHA1 hash:
aecaabc92c02f89d34de30c1e5b265518d41b2b8
Detections:
FormBook
win_formbook_auto
win_formbook_g0
Parent samples :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 hash:
2089e6122c6d443f49e3d3ed56578971c1543e0de6d6ee72c8da44ec2ff4dbbf
MD5 hash:
e6465e7b41a2e16ed24eb6ca253e6b5d
SHA1 hash:
3fc73c68cebf2371bf41c25c5763a653371d54be
SH256 hash:
a9731f99c6a49a98e6ecc244f7fc6b4263be8255559a883c58e154bb9be68b44
MD5 hash:
7c5b255f8adfbdbc610be41f154f8448
SHA1 hash:
28132f77cef05d22f912541f4fddf645c60b65cb
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.