MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c17b3e778d12a1b353c665515c1de44df04d6172f0448b62c9cf6dd9e44bb6ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 22 File information Comments

SHA256 hash: c17b3e778d12a1b353c665515c1de44df04d6172f0448b62c9cf6dd9e44bb6ca
SHA3-384 hash: 432ed19193528e7aa4961552a7c2ef0ecdec9968ea42d1b3320a3d9fa896e5fc602d75eb08a4c423d483ec535538e640
SHA1 hash: 923c3d8d95e2e3d6b538fa1342987671e1ba7c98
MD5 hash: 10b3d7bf0908989230549cf5ee191774
humanhash: low-floor-whiskey-idaho
File name:DHL consignment number_#880595460.exe
Download: download sample
Signature Formbook
File size:709'632 bytes
First seen:2023-11-09 07:19:19 UTC
Last seen:2023-11-09 09:16:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:M7Nq2/6N7CO2Fw04Yl6xF1uMQLMXaAThAFZ+kbAIWtDqO:MdSElpl6F1NPtOEkb3WVqO
Threatray 95 similar samples on MalwareBazaar
TLSH T16FE47B3D5DAD1637C1BADFA58FC5856BF0D0A9AB3151AD78A8D303664302E46F9C023E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
292
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2023-11-09 04:16:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Loads dropped DLL
Unpacked files
SH256 hash:
d05893b7f6f8e80de00ec14432669d61fcc0e3e84d1a8235e6c9207a2fecc650
MD5 hash:
5fbe5d27b6cbcb98066b83b977bcf634
SHA1 hash:
bfe5828699cc8d7b30f878dfbc3c3d803b9ef138
SH256 hash:
d01f3dea3851602ba5a0586c60430d286adf6fcc7e17aab080601a66630606e5
MD5 hash:
579197d4f760148a9482d1ebde113259
SHA1 hash:
cf6924eb360c7e5a117323bebcb6ee02d2aec86d
SH256 hash:
bfef9eac82e53e8d63bcb3b3022880eaf8f22cbbc6c69f3782b59c438f649f12
MD5 hash:
ddf81912128dd196140e9be656c3a212
SHA1 hash:
51221baf7115f7f2de03cd00b8b25cfde9241a35
SH256 hash:
1eb7d6a71175e06151d0d9bdc2b411d80b189f32c52e4669b67f4b0da963dfdd
MD5 hash:
c094b79bcc1fd42abc7ca63857ee6ea1
SHA1 hash:
1f861fafbc4c72c4e4dd4515638d7225fbfe5590
SH256 hash:
6bf53345586f023cc89dfd978d8b06a3dcb919c120d68980742c2cb935d250e2
MD5 hash:
0a308f52bbfe5e3aba5f35edac78aafc
SHA1 hash:
e324a8eab657de947295c0abbb0e847222cf6888
SH256 hash:
66d755c0d762f9f8de7e02a8f02ec9f6e0e595156b1bb54c895c4b62320251e6
MD5 hash:
2d6b4ce4bd44b13cdf9a59dd1fe6c82d
SHA1 hash:
b9e04e37ff4d24d4b69f814d6f3de413597458a1
SH256 hash:
2a08945dc4c2c1186d0a2e0818f8858d9cc978369c5eceb89a337d378e734bf5
MD5 hash:
9a6f45db0a2a99f3132bc2f683952f39
SHA1 hash:
888266217e0b89606e6aae973d641b5487b8507e
SH256 hash:
276181a062c56c53dbd534d092575dd024f3ec88e208a3abddc7f6fdea5b4784
MD5 hash:
9bab185fe159c27493822073c340f700
SHA1 hash:
727f06a0e4f7c29cab4c7ae17aa5a35e1b319dd7
SH256 hash:
1824e56095a8ef15ccfd673304362311cd214fe58254af27548a8a048f65d002
MD5 hash:
52475587987753f8c3219f2ca95c9767
SHA1 hash:
6ddbcd7fb4ec3a52116a269504a20af6ba1eac79
SH256 hash:
be4678ab759629b640428fca2a85483e237afd21462f159ccc63dce514cb0118
MD5 hash:
68157c18cc90e3940126d495a6e6d5d9
SHA1 hash:
0e65ce0fc90e02f63e8cdb44d28f1a5f52102b0a
SH256 hash:
c17b3e778d12a1b353c665515c1de44df04d6172f0448b62c9cf6dd9e44bb6ca
MD5 hash:
10b3d7bf0908989230549cf5ee191774
SHA1 hash:
923c3d8d95e2e3d6b538fa1342987671e1ba7c98
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:DebuggerCheck__GlobalFlags
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Formbook
Author:kevoreilly
Description:Formbook Payload
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_Formbook
Author:@malgamy12
Rule name:Windows_Trojan_Formbook_1112e116
Author:Elastic Security
Rule name:win_formbook_w0
Author:@malgamy12

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe c17b3e778d12a1b353c665515c1de44df04d6172f0448b62c9cf6dd9e44bb6ca

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments