MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b967fa620a94b3669bae343ebf01c1150e5600d1b5967babc9bed153da762aad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: b967fa620a94b3669bae343ebf01c1150e5600d1b5967babc9bed153da762aad
SHA3-384 hash: 351b80ad9a97216392fdee20378481da0f2487003c2fbb30d00ab9de1985fd582118ffa7517cb57e698f20024c678b2d
SHA1 hash: 0064a1ff13486da886e985057cf00355682c8e62
MD5 hash: 10067ce3204d25b95b24cc27382dfc4f
humanhash: august-golf-lion-thirteen
File name:e-dekont.exe
Download: download sample
Signature Formbook
File size:1'224'247 bytes
First seen:2022-10-10 14:27:23 UTC
Last seen:2022-10-10 15:53:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:0AOcZ2i7sQydmdiPD+C4AeCwaT2j5HUSIOg0+MkYGF:iA2mYP6C5waTG5HPny
TLSH T19B451213B7C58471D8722A315E26AB266D7DB9600E30EE1FA3D44A6DDF720C1A135BE3
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f0d8ec9898f0d8aa (9 x Formbook, 6 x NanoCore, 3 x Vjw0rm)
Reporter abuse_ch
Tags:exe FormBook geo TUR

Intelligence


File Origin
# of uploads :
2
# of downloads :
195
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Enabling the 'hidden' option for files in the %temp% directory
Creating a process from a recently created file
Creating a file
Adding an access-denied ACE
Launching a process
Launching the default Windows debugger (dwwin.exe)
Launching cmd.exe command interpreter
Reading critical registry keys
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2022-10-10 12:56:50 UTC
File Type:
PE (Exe)
Extracted files:
169
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:oy10 rat spyware stealer trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
8e0faaf2ca7734e9cd9c267404d5c264aba3b23613fade6906d0bafff02ce357
MD5 hash:
41c7ced8e54804d685136b06db9e30f5
SHA1 hash:
ca1fde3e00c91084289906bbf32df09ae03156ca
SH256 hash:
b967fa620a94b3669bae343ebf01c1150e5600d1b5967babc9bed153da762aad
MD5 hash:
10067ce3204d25b95b24cc27382dfc4f
SHA1 hash:
0064a1ff13486da886e985057cf00355682c8e62
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:crime_win32_ransom_avaddon_1
Author:@VK_Intel
Description:Detects Avaddon ransomware
Reference:https://twitter.com/VK_Intel/status/1300944441390370819
Rule name:malware_Formbook_strings
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.
Rule name:sfx_pdb_winrar_restrict
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments