MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c67f8d964ee3965911b0f29dd28a6bd65f136662f5cd3a1193f85ab7e81656c2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 14 File information Comments

SHA256 hash: c67f8d964ee3965911b0f29dd28a6bd65f136662f5cd3a1193f85ab7e81656c2
SHA3-384 hash: 5906e4ec16708ea2dcf416719e98b0603aaa93bfbdd8fee7684380d3f857e513f548aa97bb1461f4b3f3d2327701a411
SHA1 hash: 2f3593eb45c60ca5581aafd737ac8b6af9bbe6f9
MD5 hash: 4fbe8b12fef334afbe168df6cd8ddcf6
humanhash: saturn-comet-hawaii-vermont
File name:Curriculum Vitae Catalina Munoz.exe
Download: download sample
Signature Formbook
File size:816'128 bytes
First seen:2024-05-17 14:40:50 UTC
Last seen:2024-05-17 15:21:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'747 x AgentTesla, 19'638 x Formbook, 12'244 x SnakeKeylogger)
ssdeep 24576:PDLDZMRpkFgrB89ie2AOeoqhXtHmc1UH:PPowgry4e2AO4t7S
TLSH T1DF05F1DD7650B0DFC857C936D9A41C60AA2070BB831FE247A49312ADD94EA9BCF150FB
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter malwarelabnet
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
322
Origin country :
CA CA
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c67f8d964ee3965911b0f29dd28a6bd65f136662f5cd3a1193f85ab7e81656c2.exe
Verdict:
Malicious activity
Analysis date:
2024-05-17 14:42:44 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
MSIL Injector
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1443358 Sample: Curriculum Vitae Catalina M... Startdate: 17/05/2024 Architecture: WINDOWS Score: 100 28 www.uqdr.cn 2->28 30 www.theppelin.online 2->30 32 18 other IPs or domains 2->32 42 Snort IDS alert for network traffic 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 48 7 other signatures 2->48 10 Curriculum Vitae Catalina Munoz.exe 3 2->10         started        signatures3 process4 signatures5 60 Injects a PE file into a foreign processes 10->60 13 Curriculum Vitae Catalina Munoz.exe 10->13         started        process6 signatures7 62 Maps a DLL or memory area into another process 13->62 16 UGILqmhGadZBdgoHQB.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 TSTheme.exe 13 16->19         started        process10 signatures11 50 Tries to steal Mail credentials (via file / registry access) 19->50 52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 54 Modifies the context of a thread in another process (thread injection) 19->54 56 2 other signatures 19->56 22 UGILqmhGadZBdgoHQB.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.getmall.online 203.161.43.228, 51022, 51023, 51024 VNPT-AS-VNVNPTCorpVN Malaysia 22->34 36 www.shengniu.com 152.32.189.143, 51042, 51043, 51044 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK Hong Kong 22->36 38 10 other IPs or domains 22->38 58 Found direct / indirect Syscall (likely to bypass EDR) 22->58 signatures14
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2024-05-17 13:31:55 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
17 of 37 (45.95%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
8e1e81a2517df82e4f890e7f06af93645f610015f1b0043f205882449eee1b96
MD5 hash:
dcf6f858e1fd755e7227e3dcdd1c81c6
SHA1 hash:
2efa0a938ddf19aae6f33de5dc99140eedfa801b
SH256 hash:
6215c4f3fc7666f2a5757e6779864a884d7d698bb02594e4c8456f84daf6bb5e
MD5 hash:
cfe7e26312cf4ce9c4c628a290b6a55a
SHA1 hash:
71216d923775f21b2ee26913d1098fc035eb0b77
SH256 hash:
84e082ad06c2c1d0b38dcdd2e498701374d4a3c336948af90f17354236c025fa
MD5 hash:
d86ae2ac1932ee70d44adf6d4d46305a
SHA1 hash:
d0e5447cd057d5bbbb74664201188a6bd18942c4
SH256 hash:
f540e8d603962027b3a1f8b86d035281bfbdd3a05a621ead255825bc2082632a
MD5 hash:
d172f59251b97b415b621d302e1be2b7
SHA1 hash:
b1534e603749c901b5ac185f20e281f6be7fa908
SH256 hash:
27ddc96465ac70b602e730ca4b28018a2875f5aca4215f3d8608b9defc8bf23d
MD5 hash:
1b2614489be216f14010dea5dee50dc5
SHA1 hash:
046c2462662dc3adea1c79121b4d865665850e23
SH256 hash:
c67f8d964ee3965911b0f29dd28a6bd65f136662f5cd3a1193f85ab7e81656c2
MD5 hash:
4fbe8b12fef334afbe168df6cd8ddcf6
SHA1 hash:
2f3593eb45c60ca5581aafd737ac8b6af9bbe6f9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Formbook
Author:kevoreilly
Description:Formbook Payload
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_Formbook
Author:@malgamy12
Rule name:Windows_Trojan_Formbook_1112e116
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/formbook-adopts-cab-less-approach
Rule name:win_formbook_w0
Author:@malgamy12

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments