MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c9df8ee8291e7b125f140eb2dbad2c9eecd45b58e3b85a1c38d01ffcf3218150. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: c9df8ee8291e7b125f140eb2dbad2c9eecd45b58e3b85a1c38d01ffcf3218150
SHA3-384 hash: 4153e12f33bba94c2ac1be59e444d7611a708a76a7fb83d8b95626cb4a8242681bffc466e2f257d7ca0b43d4a33b28e4
SHA1 hash: e666771f265fbe6ffb19726def6dcb333ab8cf7e
MD5 hash: 95269aceffe9ce44698b97ae89f6909c
humanhash: cup-diet-chicken-arizona
File name:PO-H23-0006384.exe
Download: download sample
Signature Formbook
File size:733'184 bytes
First seen:2024-02-12 07:40:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:x4EzqHKMbNrpZ4ZQtsLWhI7xjuNFU9J4rjmmbC+nulxpUuVxpSRxD0DN7MTlMxov:xrz87bBH4pLyYuzMe2x+uxBpSRuN7MRT
TLSH T1A3F423806BE9D7A3C5B983FE789912113B7292176436EB0DFC9965DD4393F801360BA3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 9679d4b4a2ec6196 (4 x Formbook, 4 x AgentTesla, 1 x RemcosRAT)
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
293
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
PO-H23-0006384.rar
Verdict:
Malicious activity
Analysis date:
2024-02-12 05:28:30 UTC
Tags:
formbook stealer spyware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Launching a process
Restart of the analyzed sample
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
MSIL Injector
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1390578 Sample: PO-H23-0006384.exe Startdate: 12/02/2024 Architecture: WINDOWS Score: 100 56 www.pulsytech.xyz 2->56 58 www.news-as-bad.online 2->58 60 17 other IPs or domains 2->60 70 Malicious sample detected (through community Yara rule) 2->70 72 Antivirus detection for URL or domain 2->72 74 Sigma detected: Scheduled temp file as task from temp location 2->74 78 7 other signatures 2->78 10 PO-H23-0006384.exe 7 2->10         started        14 oRwcFTVBKGJFE.exe 5 2->14         started        signatures3 76 Performs DNS queries to domains with low reputation 56->76 process4 file5 52 C:\Users\user\AppData\...\oRwcFTVBKGJFE.exe, PE32 10->52 dropped 54 C:\Users\user\AppData\Local\...\tmp68CC.tmp, XML 10->54 dropped 90 Uses schtasks.exe or at.exe to add and modify task schedules 10->90 92 Adds a directory exclusion to Windows Defender 10->92 94 Injects a PE file into a foreign processes 10->94 16 PO-H23-0006384.exe 10->16         started        19 powershell.exe 23 10->19         started        21 schtasks.exe 1 10->21         started        96 Multi AV Scanner detection for dropped file 14->96 98 Machine Learning detection for dropped file 14->98 23 oRwcFTVBKGJFE.exe 14->23         started        25 schtasks.exe 1 14->25         started        27 oRwcFTVBKGJFE.exe 14->27         started        signatures6 process7 signatures8 68 Maps a DLL or memory area into another process 16->68 29 SNdJeBfDTnugIIsEipeR.exe 16->29 injected 31 WmiPrvSE.exe 19->31         started        33 conhost.exe 19->33         started        35 conhost.exe 21->35         started        37 SNdJeBfDTnugIIsEipeR.exe 23->37 injected 40 conhost.exe 25->40         started        process9 signatures10 42 upnpcont.exe 13 29->42         started        80 Maps a DLL or memory area into another process 37->80 45 upnpcont.exe 37->45         started        process11 signatures12 82 Tries to steal Mail credentials (via file / registry access) 42->82 84 Tries to harvest and steal browser information (history, passwords, etc) 42->84 86 Writes to foreign memory regions 42->86 88 3 other signatures 42->88 47 SNdJeBfDTnugIIsEipeR.exe 42->47 injected 50 firefox.exe 42->50         started        process13 dnsIp14 62 www.pulsytech.xyz 66.29.149.46, 49736, 49737, 49738 ADVANTAGECOMUS United States 47->62 64 www.dolceitalyescorts.com 185.27.134.60, 49732, 49733, 49734 WILDCARD-ASWildcardUKLimitedGB United Kingdom 47->64 66 11 other IPs or domains 47->66
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2024-02-12 03:36:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
19 of 37 (51.35%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Unpacked files
SH256 hash:
a910e8639fb527e5062537f8cdb5dc8e700104b5752900083ba836d056d5a7fa
MD5 hash:
984c799a3e697fbae6d9d48d277beae9
SHA1 hash:
35b2af9bd4a9cc6ccda59b2dede65d9b491ff10f
Detections:
win_formbook_w0 win_formbook_g0
SH256 hash:
76e42ef3b3e0e5a5a11f27b18debdfa3ab02e162844d4a3ea29fe003bcaf7d21
MD5 hash:
c08e5f7c829913190e3374e3bb34623f
SHA1 hash:
42eeb23f84b9b87b90fa149425805dfc30b3a38c
SH256 hash:
c4ad3351d04ce6d339969f5682c1978420041aba7a2084a33178e50c62746d86
MD5 hash:
5adca6a717e1b4517cd2ffb2a69981de
SHA1 hash:
4db158aaa7f572e383133263feb7bd26f37ca7cd
SH256 hash:
d6a0c0e8655799d408dd3390ea452bbdc5ed69f1f1e8de2842264e5e62c6ba30
MD5 hash:
5752e7a99b4631969f0acba0c4ae8437
SHA1 hash:
f0e331169fc18e5ef021cb52a5a5f8f6fc9f270c
SH256 hash:
3e0ca5b23188cf307a863446ec3c9c6eff650b128c7302b27dacf1ec78ded605
MD5 hash:
e79c3fb01054e6dd476b9b6750f012bd
SHA1 hash:
bb3ee876c3ff608a62ec898e5c3d966588ca760a
SH256 hash:
971c821aa19832e04f1dd44b19cdb909d36d27be2f9e62edd10bf7887a43d15a
MD5 hash:
6d7a285502323918820b8513b5f33d75
SHA1 hash:
9633177bbb29c2563fec4a7dd381f4a278588437
SH256 hash:
56a5c68ddbc399b855d77ba6a88a6fd4a9cd9c2e9b1bcd93bb9835c4a958e736
MD5 hash:
8220bca1fdb62c03added0f1177aed30
SHA1 hash:
acfe5495727e8520844cbbd4a7685f4e30a2a31c
SH256 hash:
0fddb71c59971ff5c910cf32e6d71c1cd90503da8a082f8d03afce9c0054b4a9
MD5 hash:
0c1423c58383329ff1c502ed4dc2de62
SHA1 hash:
7524d130f54a0d40eb720b2557cb47d7bc6e1286
SH256 hash:
3c4b1c6f34827c0b9c8f6ee407ea7f0ed0f7e3e94a1a9c89bca0b26de06e5b13
MD5 hash:
4c93cb568abb21068376443a545c68fb
SHA1 hash:
740f7da9a25e976b31d169845693f607aeda47cc
SH256 hash:
11b5901e78425ecfce8a75e7cfb722502ceeeb37aa546fb1253032e3ecd1d647
MD5 hash:
c8190d49dc52c795c3763f4ba29b8a49
SHA1 hash:
6643c25a6200931b0426a0f892e1563df696e6da
SH256 hash:
5f1ac2d5c8a3be9995ffe7cd9e5f930f0de891d72c6abec489f24f577735798f
MD5 hash:
f2d5bff83504ff2bc4d40f0fc1069a2b
SHA1 hash:
4dba0129d63354149e7010937e787955e645372e
SH256 hash:
9cec355a7444f21f4480186729539b41f9f62f51073fa8a142a1a02b6e8e5bf7
MD5 hash:
2301bc171c6aebd4d8e74b659db6a3fd
SHA1 hash:
3af0cb51b19fe9e46fd8ca438ad189818b81acf8
SH256 hash:
c9df8ee8291e7b125f140eb2dbad2c9eecd45b58e3b85a1c38d01ffcf3218150
MD5 hash:
95269aceffe9ce44698b97ae89f6909c
SHA1 hash:
e666771f265fbe6ffb19726def6dcb333ab8cf7e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments