MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c3f39d499f8599e009697219a0c0f9b5fd91848b693fcaf4abdc0d15bdc67de0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 19


Intelligence 19 IOCs YARA 17 File information Comments

SHA256 hash: c3f39d499f8599e009697219a0c0f9b5fd91848b693fcaf4abdc0d15bdc67de0
SHA3-384 hash: b4c6ce769db98158886b574ddcfbb35b1a9454a47ea0a539cee6901d46d2297df7ec4cd0d6504c80d16fbf8780ad8062
SHA1 hash: 8782a78e6e4fe3c8f4d328e434a685e5d383a8f5
MD5 hash: b27c1ca4c65a3f38a999bdf3b82d5892
humanhash: may-coffee-asparagus-michigan
File name:NUTRIMIX Payment T.Tpdf.exe
Download: download sample
Signature Formbook
File size:688'648 bytes
First seen:2025-05-13 12:31:31 UTC
Last seen:2025-05-13 13:08:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'746 x AgentTesla, 19'624 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:4vAQ63lX1bD1MMwPf80Cep9dROOtrPrjGP85L0argJL3h+0eQBB6rvd8qncRwJvR:4vAQ63lX1bD1MMwPf80Cep9dROOtrPrL
Threatray 451 similar samples on MalwareBazaar
TLSH T14CE4027537A9D506D9EB0B70AC71D3B40BB4BE8EA812C30B9DE8BEDF34267442512752
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter Anonymous
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
536
Origin country :
PL PL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
NUTRIMIX Payment T.Tpdf.exe
Verdict:
Malicious activity
Analysis date:
2025-05-13 12:34:33 UTC
Tags:
netreactor formbook stealer xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
spawn shell msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Creating a file
Launching cmd.exe command interpreter
Setting browser functions hooks
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expired-cert invalid-signature masquerade obfuscated packed packed packer_detected signed vbnet
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1688900 Sample: NUTRIMIX Payment T.Tpdf.exe Startdate: 13/05/2025 Architecture: WINDOWS Score: 100 66 www.yk8.xyz 2->66 68 www.aospin-sms.xyz 2->68 70 9 other IPs or domains 2->70 74 Suricata IDS alerts for network traffic 2->74 76 Found malware configuration 2->76 78 Malicious sample detected (through community Yara rule) 2->78 82 12 other signatures 2->82 11 NUTRIMIX Payment T.Tpdf.exe 7 2->11         started        15 gVUPUAyKxD.exe 5 2->15         started        17 svchost.exe 2->17         started        signatures3 80 Performs DNS queries to domains with low reputation 68->80 process4 dnsIp5 56 C:\Users\user\AppData\...\gVUPUAyKxD.exe, PE32 11->56 dropped 58 C:\Users\user\AppData\Local\...\tmpE1B3.tmp, XML 11->58 dropped 60 C:\Users\...60UTRIMIX Payment T.Tpdf.exe.log, ASCII 11->60 dropped 94 Adds a directory exclusion to Windows Defender 11->94 20 vbc.exe 11->20         started        23 powershell.exe 23 11->23         started        25 powershell.exe 23 11->25         started        27 schtasks.exe 1 11->27         started        96 Multi AV Scanner detection for dropped file 15->96 29 vbc.exe 15->29         started        31 schtasks.exe 15->31         started        62 127.0.0.1 unknown unknown 17->62 file6 signatures7 process8 signatures9 84 Modifies the context of a thread in another process (thread injection) 20->84 86 Maps a DLL or memory area into another process 20->86 88 Sample uses process hollowing technique 20->88 92 3 other signatures 20->92 33 explorer.exe 52 1 20->33 injected 90 Loading BitLocker PowerShell Module 23->90 37 conhost.exe 23->37         started        39 WmiPrvSE.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 27->43         started        45 conhost.exe 31->45         started        process10 dnsIp11 64 204.79.197.203, 443 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 33->64 72 Uses ipconfig to lookup or modify the Windows network settings 33->72 47 wlanext.exe 33->47         started        50 ipconfig.exe 33->50         started        signatures12 process13 signatures14 98 Modifies the context of a thread in another process (thread injection) 47->98 100 Maps a DLL or memory area into another process 47->100 102 Tries to detect virtualization through RDTSC time measurements 47->102 104 Switches to a custom stack to bypass stack traces 47->104 52 cmd.exe 47->52         started        process15 process16 54 conhost.exe 52->54         started       
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-05-13 03:11:40 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:bi14 discovery execution rat spyware stealer trojan
Behaviour
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Uses the VBS compiler for execution
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Unpacked files
SH256 hash:
d95af64d63e35a6a0c7962b9cf6a1f359f4588e85985129d0da628eb08dc7d77
MD5 hash:
2080a63b6709fdd1d070de2fd2017ed7
SHA1 hash:
67e0b2512ab173b34ff436e5c42552973ff0277e
Detections:
win_formbook_w0 win_formbook_g0 win_formbook_auto FormBook Windows_Trojan_Formbook Formbook
SH256 hash:
c3f39d499f8599e009697219a0c0f9b5fd91848b693fcaf4abdc0d15bdc67de0
MD5 hash:
b27c1ca4c65a3f38a999bdf3b82d5892
SHA1 hash:
8782a78e6e4fe3c8f4d328e434a685e5d383a8f5
SH256 hash:
263a28d4fb8fb6d2f8dfb53fe3feac86fcbd24da2e3f9a36b3cc6de36e3250d9
MD5 hash:
38546b39daf220833ccf24c1306b6049
SHA1 hash:
0de25aab5780dc658791f723dbda40ba8577c8ba
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__GlobalFlags
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dgaagas
Author:Harshit
Description:Uses certutil.exe to download a file named test.txt
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments