MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b6271260d2a30b87f701cd6c4fba52fc3e4012c9cdf6a280e324b695941c6fa4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | b6271260d2a30b87f701cd6c4fba52fc3e4012c9cdf6a280e324b695941c6fa4 |
|---|---|
| SHA3-384 hash: | c22d6c062792479d724af3ad7e3c4cea10f31ee8b6aeb3851734da3952fd18097970d9f2433ec25aff544e883a10dcc0 |
| SHA1 hash: | f1f054090256f887caa47ef346051c2ae5267127 |
| MD5 hash: | b23a2ddc7ef875889a0ee693620c88b7 |
| humanhash: | california-aspen-romeo-oregon |
| File name: | PAGO-630.900.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'608'704 bytes |
| First seen: | 2024-08-28 13:03:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 948cc502fe9226992dce9417f952fce3 (1'182 x CredentialFlusher, 446 x Formbook, 231 x AgentTesla) |
| ssdeep | 24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8aDthteQ2wpcSuOlxkc496EG:5TvC/MTQYxsWR7arAQrcSplxk99r |
| Threatray | 2'932 similar samples on MalwareBazaar |
| TLSH | T1A375CF0237D1C027FF9795324EE6F725867C5E251827A61F1BA43DBCBE706A01A2E352 |
| TrID | 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 12.5% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.4% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0cacc0c4b0944c10 (53 x Formbook, 1 x AgentTesla) |
| Reporter | Anonymous |
| Tags: | exe FormBook |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | pe_detect_tls_callbacks |
|---|
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.