MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bbcb225a7c276aeb6f8dc8126d020327dff57ef23a80ff47eaba2cd2392c7f25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: bbcb225a7c276aeb6f8dc8126d020327dff57ef23a80ff47eaba2cd2392c7f25
SHA3-384 hash: a36bf950391ad34c3dfe5d1be606655a3bc6a7fa9d5e9dc6f0a608f8951e1b5e8e0c343fc34a20de93dca2a49bb0b78c
SHA1 hash: 7349dd97f1b92fbf746f3097fbcfcfbaf2f00df0
MD5 hash: 9e1a7f42527891e28292051bc53b4c34
humanhash: spring-kitten-one-triple
File name:Payment Notice.exe
Download: download sample
Signature Formbook
File size:754'688 bytes
First seen:2023-01-31 07:13:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:vSQZNcQOst8h787EBfiSNlEEF5mJgeCRBYJhfgH8iaxeWeh3ih9HNA:XNc9s2YERie2E7ney6zgcXUBYTW
TLSH T137F4126983A8CFE6CA6803BF19F164585BB12996F06FE70D0FFFA0DD4886742511139B
TrID 47.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
20.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.4% (.SCR) Windows screen saver (13097/50/3)
6.8% (.EXE) Win64 Executable (generic) (10523/12/4)
4.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
193
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Payment Notice.exe
Verdict:
Malicious activity
Analysis date:
2023-01-31 07:15:32 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Searching for synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 794953 Sample: Payment Notice.exe Startdate: 31/01/2023 Architecture: WINDOWS Score: 100 37 Snort IDS alert for network traffic 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 Antivirus detection for URL or domain 2->41 43 9 other signatures 2->43 10 Payment Notice.exe 3 2->10         started        process3 file4 27 C:\Users\user\...\Payment Notice.exe.log, ASCII 10->27 dropped 13 Payment Notice.exe 10->13         started        process5 signatures6 51 Modifies the context of a thread in another process (thread injection) 13->51 53 Maps a DLL or memory area into another process 13->53 55 Sample uses process hollowing technique 13->55 57 Queues an APC in another process (thread injection) 13->57 16 explorer.exe 2 1 13->16 injected process7 dnsIp8 29 www.tzhysj.com 156.234.99.211, 49699, 80 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 16->29 31 www.hjd87e.com 104.21.77.241, 49698, 80 CLOUDFLARENETUS United States 16->31 33 www.dv4j2dq3c2f.com 16->33 35 System process connects to network (likely due to code injection or exploit) 16->35 20 chkdsk.exe 16->20         started        signatures9 process10 signatures11 45 Modifies the context of a thread in another process (thread injection) 20->45 47 Maps a DLL or memory area into another process 20->47 49 Tries to detect virtualization through RDTSC time measurements 20->49 23 cmd.exe 1 20->23         started        process12 process13 25 conhost.exe 23->25         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-01-31 07:14:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
15
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:sz17 rat spyware stealer trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Unpacked files
SH256 hash:
3b0d3207d4e8e1382b9f6c51594d5ff36a2bf4fb873f2296f5b3d3a6e133c198
MD5 hash:
c63ccc28137498f3e9a28af52e1c0c8f
SHA1 hash:
1c701cf3df971d7a8bef396038bbb36cdab89d26
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
1a4f77222e80f6118c9c00de102131c3a58bc60394d93abdcab6ba1d5e8d56f5
MD5 hash:
a85cc38200240eafd52c8bb4b206eb23
SHA1 hash:
fc8240184924656b34e9ad3bf5d42c5eceaaedcd
SH256 hash:
178cc7474b323b0ae6b3095ff67127726530d9d44be5cb58ba7315ef3a1199ad
MD5 hash:
159af9cf7f94d64c8120c80268965306
SHA1 hash:
fb41ab37af2c83e96d97e9cd066f90e72d4887ea
SH256 hash:
6ee8aa376745771c1cbb47f92710d7ef69b02ca808111d3532e4ffa6201fd1cb
MD5 hash:
4c1962058a28cc8d4d9b5ca7c36b128e
SHA1 hash:
e50111803780b9f92dd7f0393e0fb7aed16ae1f2
SH256 hash:
b25b72916e000adf0a7dc3acc7bb2d2b65d8b6e09ffa0ec3c6c89d6bb27c1bec
MD5 hash:
a04921c148d7983004c7a3b06a594588
SHA1 hash:
0e4e2609005470adc1b444f978b33189d016d324
SH256 hash:
bbcb225a7c276aeb6f8dc8126d020327dff57ef23a80ff47eaba2cd2392c7f25
MD5 hash:
9e1a7f42527891e28292051bc53b4c34
SHA1 hash:
7349dd97f1b92fbf746f3097fbcfcfbaf2f00df0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe bbcb225a7c276aeb6f8dc8126d020327dff57ef23a80ff47eaba2cd2392c7f25

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments