MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 17 File information Comments

SHA256 hash: aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536
SHA3-384 hash: 68be4e03c2877ec5417f5abc23557f618813db8dd75e9e7dcfc246b37113d098c10d2bd157ce69644f351aadc168212b
SHA1 hash: a201c10fcdfb902ae87a7817179ecb84a6b50a90
MD5 hash: 99ef63ade7acea38cd4053c5b69d61e0
humanhash: missouri-angel-bravo-eight
File name:AA9FF4E33F61DD2FC164A21D0A53397F19B7F9C64D786.exe
Download: download sample
Signature Formbook
File size:3'059'424 bytes
First seen:2021-10-30 00:35:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBlPkZVi7iKiF8cUvFyPOrQC914+sM7tO0r/JnTMsEwJ84vLRaBtIl9mTNYP8Z+:xNri7ixZUvFyPOx4O/xw7CvLUBsKFZ+
Threatray 667 similar samples on MalwareBazaar
TLSH T189E53311BBEBC1FAC751303499512FBAD0FAC3991725489F3704AB5D5F389E2812B89B
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe FormBook


Avatar
abuse_ch
Formbook C2:
http://91.219.236.97/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.236.97/ https://threatfox.abuse.ch/ioc/239602/

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
AA9FF4E33F61DD2FC164A21D0A53397F19B7F9C64D786.exe
Verdict:
No threats detected
Analysis date:
2021-10-30 00:46:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook Nitol RedLine SmokeLoader Socel
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Renames NTDLL to bypass HIPS
Sigma detected: Suspicious Svchost Process
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected FormBook
Yara detected Nitol
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 512093 Sample: AA9FF4E33F61DD2FC164A21D0A5... Startdate: 30/10/2021 Architecture: WINDOWS Score: 100 142 Multi AV Scanner detection for domain / URL 2->142 144 Malicious sample detected (through community Yara rule) 2->144 146 Antivirus detection for URL or domain 2->146 148 16 other signatures 2->148 10 AA9FF4E33F61DD2FC164A21D0A53397F19B7F9C64D786.exe 18 2->10         started        13 rundll32.exe 2->13         started        process3 file4 98 C:\Users\user\AppData\...\setup_install.exe, PE32 10->98 dropped 100 C:\Users\user\AppData\Local\...\sahiba_3.txt, PE32 10->100 dropped 102 C:\Users\user\AppData\Local\...\sahiba_2.txt, PE32 10->102 dropped 104 13 other files (2 malicious) 10->104 dropped 15 setup_install.exe 1 10->15         started        20 rundll32.exe 13->20         started        process5 dnsIp6 130 192.64.119.193 NAMECHEAP-NETUS United States 15->130 132 127.0.0.1 unknown unknown 15->132 72 C:\Users\user\AppData\...\sahiba_9.exe (copy), PE32 15->72 dropped 74 C:\Users\user\AppData\...\sahiba_7.exe (copy), PE32 15->74 dropped 76 C:\Users\user\AppData\...\sahiba_2.exe (copy), PE32 15->76 dropped 78 7 other files (1 malicious) 15->78 dropped 134 Detected unpacking (changes PE section rights) 15->134 22 cmd.exe 1 15->22         started        24 cmd.exe 1 15->24         started        26 cmd.exe 1 15->26         started        32 8 other processes 15->32 136 Writes to foreign memory regions 20->136 138 Allocates memory in foreign processes 20->138 140 Creates a thread in another existing process (thread injection) 20->140 28 svchost.exe 20->28 injected 30 svchost.exe 20->30 injected file7 signatures8 process9 process10 34 sahiba_7.exe 22->34         started        39 sahiba_2.exe 1 24->39         started        41 sahiba_1.exe 2 26->41         started        43 sahiba_9.exe 32->43         started        45 sahiba_4.exe 16 32->45         started        47 sahiba_3.exe 12 32->47         started        49 4 other processes 32->49 dnsIp11 106 45.142.182.152 XSSERVERNL Germany 34->106 108 136.144.41.201 WORLDSTREAMNL Netherlands 34->108 114 10 other IPs or domains 34->114 80 C:\Users\...\yCwAFKI68VA4qKCR53D7vtou.exe, PE32 34->80 dropped 82 C:\Users\...\tyk5Zt3R9cvKAE8pn6Z2tDIc.exe, PE32 34->82 dropped 84 C:\Users\...\sXWP07IFNfbmm823gN24i6rK.exe, PE32 34->84 dropped 88 22 other malicious files 34->88 dropped 150 Drops PE files to the document folder of the user 34->150 152 Creates HTML files with .exe extension (expired dropper behavior) 34->152 154 Disable Windows Defender real time protection (registry) 34->154 51 sKBIGeXfkNR3dJhXl_UlgR6j.exe 34->51         started        55 oNR2E0mtPsNfQMQdhTnkmtHj.exe 34->55         started        86 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 39->86 dropped 156 DLL reload attack detected 39->156 158 Renames NTDLL to bypass HIPS 39->158 160 Checks if the current machine is a virtual machine (disk enumeration) 39->160 58 explorer.exe 39->58 injected 162 Creates processes via WMI 41->162 60 sahiba_1.exe 5 41->60         started        164 Injects a PE file into a foreign processes 43->164 62 sahiba_9.exe 43->62         started        116 2 other IPs or domains 45->116 64 WerFault.exe 45->64         started        118 2 other IPs or domains 47->118 66 WerFault.exe 47->66         started        110 88.99.66.31 HETZNER-ASDE Germany 49->110 112 99.83.154.118 AMAZON-02US United States 49->112 file12 signatures13 process14 dnsIp15 120 185.25.50.59 IST-ASLT Lithuania 51->120 166 Detected unpacking (changes PE section rights) 51->166 168 Detected unpacking (overwrites its own PE header) 51->168 90 C:\Users\...\oNR2E0mtPsNfQMQdhTnkmtHj.tmp, PE32 55->90 dropped 122 81.169.145.68 STRATOSTRATOAGDE Germany 58->122 124 170.178.168.203 ST-BGPUS United States 58->124 128 13 other IPs or domains 58->128 170 System process connects to network (likely due to code injection or exploit) 58->170 92 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 60->92 dropped 94 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 60->94 dropped 96 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 60->96 dropped 68 conhost.exe 60->68         started        70 WerFault.exe 62->70         started        126 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 64->126 file16 signatures17 process18
Threat name:
Win32.Infostealer.ClipBanker
Status:
Malicious
First seen:
2021-07-09 03:37:18 UTC
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar family:xloader botnet:933 botnet:ani botnet:cana campaign:s0iw aspackv2 backdoor infostealer loader rat stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Xloader Payload
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
https://sergeevih43.tumblr.com/
176.111.174.254:56328
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
detuyaluro.xyz:80
http://www.kyiejenner.com/s0iw/
Unpacked files
SH256 hash:
a50c81a7f92f090ca75c61c1b2f3d98746943951d01a38e66fd64e78a36a2005
MD5 hash:
87a11c683daffe256848bde038115443
SHA1 hash:
6add2392f7768d441522b59f4aee33deea9d3259
SH256 hash:
f43cb46a5fcc28f04ed51b9e9e5dbec43ceb69f7e9c5f010eb18558de564b372
MD5 hash:
0889f7e67c7aa7d1940302a8fdc6bd73
SHA1 hash:
14741400389d552481d003972ee788f9b5d221e3
SH256 hash:
cb6656f44da80bee4dce2c79d760f3b01a132c6711674329f396761277981df4
MD5 hash:
e3741892a42b971d96420dc73f87a75a
SHA1 hash:
4d1827f11b5469b6697e9a8b1d96e1524d6e120f
SH256 hash:
360a4038f1a7a07d17b95b06fe1b72404bcb9b60a68e2521aedbc5a4bd2126d5
MD5 hash:
27b0b797af4a3624e23f566b7e60eda3
SHA1 hash:
3c12a431c46b27bc22eb399573d26f04ed39af72
SH256 hash:
552485cade7dd326aac0519d6aca23c59a36ac84ecc8ec3c387f052f6b917126
MD5 hash:
02d52448809b869dc23872b502859b76
SHA1 hash:
3b0a674725394fe21da8cc427fb7df23ce36cf9f
SH256 hash:
4ad99d6086708e0ad744e2bef40e42b3c23a4e20ac89b74bd936f8268c85f740
MD5 hash:
eb0209cd809a34e3b1df96cec705bb50
SHA1 hash:
207e9b6962ecb81132f8b88c33ffd12ac6e7c8a0
SH256 hash:
370684d6b35fcfececa5272937a2f3691e0fef2afcb3a1a73784b5292cea9305
MD5 hash:
139a2292a372b8a1ab980318d1a3c96b
SHA1 hash:
b0b55c721b01d71c2f8c936290840c69dac9443b
SH256 hash:
aa6cc42ad1c627460a4c54cfa46fa1934518c510d2bdb323ee119c460136ed3f
MD5 hash:
f2eb93b3bbe3cad8a4b76e74ffd3ccff
SHA1 hash:
e018afa2e24e5eb03598d37d9142674ad1d7ac2f
SH256 hash:
7296d60423fbfc4877e7bbb0c1352d0756908f9fbc53679bce463320e3a382f0
MD5 hash:
7ca1af0d05d832e6039ddb2629c6007f
SHA1 hash:
b3cf5b027fa6ee5a6cebb33bde0b36eb17e9956c
SH256 hash:
8c7cdb6916702d2387737927da9a3c49a6f4c1033545c1ed9bb37fc2829e4803
MD5 hash:
dca556c5c11a934a767c12ac44f179e5
SHA1 hash:
900f5ad3481cdb4f82dccf97d0b7ab272e599dce
SH256 hash:
95e96eabdd7ade2f2fd8a80603e92044ecc89c4dd2633816142b5ea635cc4a02
MD5 hash:
0a25166be49203d92262742d51456795
SHA1 hash:
efcc96c74915e539d0d9745ba6e5d403a98ffb97
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
43654fc6462f66c771098e75cc5430900c6b31475cce6aaad996e8b2a47c389a
MD5 hash:
661a32f31caf79da63387e8197646bb6
SHA1 hash:
a050e077633f887735acbabcb69d3a6ef5a9cdda
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
5d46d61dd4742b765e10dae570af300e69457b039b386ce586ea91e9c924fbcf
MD5 hash:
e07dad6187cb85b8a62bda3f0f735672
SHA1 hash:
89b0b8e3a567d15619a2499626219c06d76d3f2c
SH256 hash:
e3b13ed3cf46c24d57994c789ddfe5c438772c413d20e062d8fa2d9e7b755cd3
MD5 hash:
6813083fa167229b40d4f130032d99aa
SHA1 hash:
61f3d8b343e5218f1dd507578393077b265a6946
SH256 hash:
d883da922360a751ea8b780ac7b3a5aedc4b09258fdd2c156bfa60593885071c
MD5 hash:
941888d7dc7810199fc9d7fe45b29947
SHA1 hash:
5f384b58763b8d3035a158d6d8d55e001af61c34
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
97f751d8e067a8ff661e6f4cb0eb7cd3033abdb89d5e87e50581e011ff4f4144
MD5 hash:
f8fdccdc4cc17f6781497d69742aeb58
SHA1 hash:
026edf00ad6a4f77a99a8100060184caeb9a58ba
SH256 hash:
384152aae357d27f4fafdbad47a42d9c9646b150555a1614d01dfa34786ad93d
MD5 hash:
5e7969486c1b53c2e2c250033a0e38cb
SHA1 hash:
4a796f82749a4c1c8db3224e58cdfce37e82a938
SH256 hash:
aa9ff4e33f61dd2fc164a21d0a53397f19b7f9c64d7861df4c9120d34c3a5536
MD5 hash:
99ef63ade7acea38cd4053c5b69d61e0
SHA1 hash:
a201c10fcdfb902ae87a7817179ecb84a6b50a90
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments