MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7bb528bfd86aea46c414f10f8463641a79e357b26d6b1b719d1e203bfa876ed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: b7bb528bfd86aea46c414f10f8463641a79e357b26d6b1b719d1e203bfa876ed
SHA3-384 hash: 1212d7955160e106efc532c994bc4c209be00b20163e68b7d298a2f3a04370a6f9392de42f4b3965f8e6f7a13d9ea0ec
SHA1 hash: 7c88313920d2de20664d77e976b82adc7d3e6e3a
MD5 hash: 3ecc4e7fb01e3fde5021bcfcd98281ca
humanhash: one-robin-maine-orange
File name:PO ZXASDC.exe
Download: download sample
Signature Formbook
File size:742'912 bytes
First seen:2024-01-24 14:02:23 UTC
Last seen:2024-01-29 09:24:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:dP0yF4VHc8eSqS5wiwEw5Q1sqYKlkrDdntF762labVicUbSWdBi0C0ewpqV:ln0ruQDktnG2lskZxdc03p4
TLSH T1B2F412397368CBB6E99E06BC849002900376AC17B553D35A1CCEB0AC4D737859667BFB
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon ecf0c68ac2c298f2 (60 x SnakeKeylogger, 14 x Formbook, 6 x AgentTesla)
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
3
# of downloads :
311
Origin country :
HU HU
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1380357 Sample: PO_ZXASDC.exe Startdate: 24/01/2024 Architecture: WINDOWS Score: 96 26 Malicious sample detected (through community Yara rule) 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected FormBook 2->30 32 4 other signatures 2->32 9 PO_ZXASDC.exe 3 2->9         started        process3 signatures4 34 Injects a PE file into a foreign processes 9->34 12 PO_ZXASDC.exe 9->12         started        process5 signatures6 36 Maps a DLL or memory area into another process 12->36 15 UfagdWluBJF.exe 12->15 injected process7 process8 17 takeown.exe 15->17         started        signatures9 22 Maps a DLL or memory area into another process 17->22 24 Queues an APC in another process (thread injection) 17->24 20 UfagdWluBJF.exe 17->20 injected process10
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2024-01-24 05:54:50 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Modifies file permissions
Unpacked files
SH256 hash:
dc543b272ecb781283205045f9395370ebcc4dfb0d773e67ba21eac98cfccf3d
MD5 hash:
4dd02e02c0550f8ccae68df755d174b3
SHA1 hash:
e9be8e4d515a3fad3c0b3cdb2fe8e65cb61eb4b3
SH256 hash:
1ebc78158dbef3d62c58c6715f4bd15a88bddf3d2d8ef7a5a067d3f5043f225e
MD5 hash:
21ff25c2ee6cf166e8b1d423aa540a83
SHA1 hash:
ae2c5efb2ada28373cc0d6c34d6475f8d5ebbe3b
SH256 hash:
cd79b93e1fab266146bfba648fd3067a3dafb9aed116b8ea918cfb50c929153a
MD5 hash:
d179e4ec44630322fff405ef00ad8073
SHA1 hash:
c4a726da0d576d6eb6324628b2d84d7ae339bb8f
SH256 hash:
47e0f14a446c450b8c0312ea5170dcae8a1db9df0864b8f4ade5abad8559b0f4
MD5 hash:
cd5c97bc2e3d8a3a41b687cf4324dffa
SHA1 hash:
115ce55cd702e518b7a1410feb0c3ad674ad35cf
SH256 hash:
b7bb528bfd86aea46c414f10f8463641a79e357b26d6b1b719d1e203bfa876ed
MD5 hash:
3ecc4e7fb01e3fde5021bcfcd98281ca
SHA1 hash:
7c88313920d2de20664d77e976b82adc7d3e6e3a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe b7bb528bfd86aea46c414f10f8463641a79e357b26d6b1b719d1e203bfa876ed

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments