MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c14cd408876aab6eecaf7354dade35554e21c7a3a784fda79ae5f6d6349f15ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | c14cd408876aab6eecaf7354dade35554e21c7a3a784fda79ae5f6d6349f15ff |
|---|---|
| SHA3-384 hash: | 25e2f8fd188c553a9c8f1ce9e9d60e5a307ad6130f16a7a8a473303b95baf5416a60040e2c608724a172f4dbe942632f |
| SHA1 hash: | 22e657a022343f610d89816147d1a498099a7344 |
| MD5 hash: | 361d62297418ccd066c19829781925c3 |
| humanhash: | lima-ack-king-california |
| File name: | SecuriteInfo.com.Trojan.Siggen15.27106.32292.19894 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 819'200 bytes |
| First seen: | 2024-03-11 11:45:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c27a46121fdf0c7d592b2676dec19736 (5 x Formbook) |
| ssdeep | 12288:vg7gE4RdCLZ3nWmAaIfGmLgdNcuApk2CDTMZEsxH2zar1BYdQarCv:vPE1LZ36/lL2Kk2CDEEsJHJ+QarC |
| Threatray | 3'617 similar samples on MalwareBazaar |
| TLSH | T1FA059D6397C05873CBEB1ABDCC0BA65DA8562D603D88A7185FF90E4CAF365957036833 |
| TrID | 86.8% (.EXE) Win32 Executable Borland Delphi 6 (262638/61) 4.6% (.EXE) Win32 Executable Delphi generic (14182/79/4) 4.3% (.SCR) Windows screen saver (13097/50/3) 1.4% (.EXE) Win32 Executable (generic) (4504/4/1) 0.6% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | 903134f0e8aa55a8 (8 x Formbook, 2 x Dbatloader, 1 x BitRAT) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
1cb6deac4e20e2a13002d118fc863a0757409bab2f45a9390529f1e6ad5217fc
eaeb4a70b5df25c40d3e443b2f4b3adbd193b0ed7ffcaf4c5ca3d5e9955134ef
96e14fedf020cef802a005cf9289d7c8f8a0f2bd516fee5f4096cf36a2f2c1e3
2a9bac8b5d947ef5f72c65bff3fe97d7ffd3602ec49915693987cd9909512187
22dd73a06a3bff8a7866c95b5191aa6a7b57d67d632b2373235e7b2ba4fd46fa
1a261ffbe76d224c7d9f9136723f1cdf35f661d0e5a38f43a7ee2cb31606f359
1e5bb5e00fddfcc62c8bfe71b46a4c8c6c22986c7a51931d16b8ddc465170d72
c11992880daecda35958fd14fcf3b6e5d32a6bda8c904a888ede0dcbb1f91aa6
42e09f0e4d7ab0448e04d5d31fbc63cfb2df988f848853a5a149ff5454040184
ff27831341c8b2477f8f59094764e8c4341be79c3f678f27cc425aef3b1ab21b
6814190b4099c532caabe663df73d8ee0c7d70b55db3c69c56eefc1dc1d162f5
c14cd408876aab6eecaf7354dade35554e21c7a3a784fda79ae5f6d6349f15ff
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BobSoftMiniDelphiBoBBobSoft |
|---|---|
| Author: | malware-lu |
| Rule name: | Borland |
|---|---|
| Author: | malware-lu |
| Rule name: | Formbook |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Formbook in memory |
| Reference: | internal research |
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Typical_Malware_String_Transforms |
|---|---|
| Author: | Florian Roth |
| Description: | Detects typical strings in a reversed or otherwise modified form |
| Reference: | Internal Research |
| Rule name: | Typical_Malware_String_Transforms |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects typical strings in a reversed or otherwise modified form |
| Reference: | Internal Research |
| Rule name: | Typical_Malware_String_Transforms_RID3473 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects typical strings in a reversed or otherwise modified form |
| Reference: | Internal Research |
| Rule name: | win_formbook_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.formbook. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::CloseHandle kernel32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | kernel32.dll::LoadLibraryExA kernel32.dll::LoadLibraryA kernel32.dll::GetSystemInfo kernel32.dll::GetStartupInfoA kernel32.dll::GetDiskFreeSpaceA kernel32.dll::GetCommandLineA |
| WIN_BASE_IO_API | Can Create Files | kernel32.dll::CreateFileA kernel32.dll::FindFirstFileA version.dll::GetFileVersionInfoSizeA version.dll::GetFileVersionInfoA |
| WIN_HTTP_API | Uses HTTP services | winhttp::WinHttpCheckPlatform |
| WIN_REG_API | Can Manipulate Windows Registry | advapi32.dll::RegOpenKeyExA advapi32.dll::RegQueryValueExA |
| WIN_USER_API | Performs GUI Actions | user32.dll::ActivateKeyboardLayout user32.dll::CreateMenu user32.dll::FindWindowA user32.dll::PeekMessageA user32.dll::CreateWindowExA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.