MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bb51ea0bd2ae770fb729c3e84f1dd896e65312768893412fec620847a98cd8b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 5 File information Comments

SHA256 hash: bb51ea0bd2ae770fb729c3e84f1dd896e65312768893412fec620847a98cd8b5
SHA3-384 hash: ff8c0d2f336d1bb08c936a23534f7da1b455b35e4ee435863f9cd507a3c480e55ceb4b8ce327b39d00bb9f1a9a7451f8
SHA1 hash: 4bf832ef26137be8517c791fee5d0723de6d24ef
MD5 hash: 77e439cdc2a85fd13b9fb36aa474d976
humanhash: avocado-oven-one-michigan
File name:Nueva lista de pedidos.exe
Download: download sample
Signature Formbook
File size:780'288 bytes
First seen:2022-08-12 08:30:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0481f726cda63570724806f63be47d53 (4 x DBatLoader, 3 x RemcosRAT, 1 x Formbook)
ssdeep 12288:QodKmNUsu8OHrlJZuCYOTW1Z2fWC9dAMEXU4nSz7eIa3f7:pYmAPrDMCYOCJCvAMEXU4nSz
TLSH T111F48D32B1FBEA33C53E59B7DF2AD16498557E486DBDE09017D03B6817B1A086A0F183
TrID 28.5% (.SCR) Windows screen saver (13101/52/3)
22.9% (.EXE) Win64 Executable (generic) (10523/12/4)
14.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win32 Executable (generic) (4505/5/1)
6.5% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon 8370d8b6d2d83083 (4 x DBatLoader, 3 x RemcosRAT, 1 x Formbook)
Reporter TeamDreier
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
322
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Nueva lista de pedidos.exe
Verdict:
Suspicious activity
Analysis date:
2022-08-11 14:00:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Launching cmd.exe command interpreter
Sending an HTTP GET request
Searching for synchronization primitives
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Yara detected DBatLoader
Yara detected FormBook
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 682970 Sample: Nueva lista de pedidos.exe Startdate: 12/08/2022 Architecture: WINDOWS Score: 100 43 www.gamelabsmash.com 2->43 45 ghs.googlehosted.com 2->45 59 Snort IDS alert for network traffic 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 Antivirus detection for URL or domain 2->63 65 6 other signatures 2->65 10 Nueva lista de pedidos.exe 1 16 2->10         started        signatures3 process4 dnsIp5 47 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49758, 49765 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 10->47 49 192.168.2.1 unknown unknown 10->49 51 3 other IPs or domains 10->51 29 C:\Users\Public\Libraries\Cnktfqzjh.exe, PE32 10->29 dropped 67 Modifies the context of a thread in another process (thread injection) 10->67 69 Maps a DLL or memory area into another process 10->69 71 Sample uses process hollowing technique 10->71 73 Queues an APC in another process (thread injection) 10->73 15 explorer.exe 2 10->15 injected file6 signatures7 process8 process9 17 Cnktfqzjh.exe 13 15->17         started        21 WWAHost.exe 15->21         started        23 Cnktfqzjh.exe 13 15->23         started        dnsIp10 31 ph-files.fe.1drv.com 17->31 33 onedrive.live.com 17->33 39 2 other IPs or domains 17->39 53 Multi AV Scanner detection for dropped file 17->53 55 Tries to detect virtualization through RDTSC time measurements 17->55 57 Maps a DLL or memory area into another process 21->57 25 cmd.exe 1 21->25         started        35 l-0003.l-dc-msedge.net 13.107.43.12, 443, 49795, 49797 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 23->35 37 ph-files.fe.1drv.com 23->37 41 3 other IPs or domains 23->41 signatures11 process12 process13 27 conhost.exe 25->27         started       
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-08-11 06:23:19 UTC
File Type:
PE (Exe)
Extracted files:
9
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:modiloader family:xloader campaign:uj3c loader persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
Adds policy Run key to start application
Executes dropped EXE
Xloader payload
Formbook
ModiLoader, DBatLoader
Xloader
Unpacked files
SH256 hash:
6e4aba5f91f4d01295db6a25820bccf96e982c11dc19eac820ec094e8bc5b5b2
MD5 hash:
32cd4b21204a9e867088e41a0be8f6aa
SHA1 hash:
21f622535ca5ed8c0670382c420d380ba4a41799
Detections:
win_dbatloader_g1
Parent samples :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 hash:
bb51ea0bd2ae770fb729c3e84f1dd896e65312768893412fec620847a98cd8b5
MD5 hash:
77e439cdc2a85fd13b9fb36aa474d976
SHA1 hash:
4bf832ef26137be8517c791fee5d0723de6d24ef
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:malware_Formbook_strings
Author:JPCERT/CC Incident Response Group
Description:detect Formbook in memory
Reference:internal research
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe bb51ea0bd2ae770fb729c3e84f1dd896e65312768893412fec620847a98cd8b5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments