MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ca285d2b340f7cdc2b495675775d0769decadda571c3858201d9ee44298ede3e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 18


Intelligence 18 IOCs YARA 3 File information Comments

SHA256 hash: ca285d2b340f7cdc2b495675775d0769decadda571c3858201d9ee44298ede3e
SHA3-384 hash: 62e56256102d03526a0840ed0dd41e46fbebb0bc9615e2dbc20d6fcd0df51b8c068dd092f6aab7374de6b482ab7b81ee
SHA1 hash: 74f1d9439717967e1ed6609fdd6147d7d2ee322b
MD5 hash: b58f5c667e17dfc7676ab4ad6486d4b7
humanhash: avocado-angel-tango-double
File name:PO#2492150 May 29 2024.exe
Download: download sample
Signature Formbook
File size:2'862'080 bytes
First seen:2024-05-30 16:51:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:f58v2DM9t0AQc0HMvSUwKqLZWtUcvfS3e1C/lyuQCSqqHsJ2XWg7/:fWv2M9t0An0mi9veIlyYma2Xn7/
Threatray 1'933 similar samples on MalwareBazaar
TLSH T1D2D50117B7664AE1F6C80F32D497401807A6DD11B7AEDA1AA84F33D617E33B5D8089CB
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 68cce3b3b9cbec70 (2 x Smoke Loader, 1 x AgentTesla, 1 x Zyklon)
Reporter threatcat_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
353
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ca285d2b340f7cdc2b495675775d0769decadda571c3858201d9ee44298ede3e.exe
Verdict:
Malicious activity
Analysis date:
2024-05-30 16:52:29 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.9%
Tags:
Generic Network Swotter
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a process with a hidden window
Creating a file
Launching a process
Сreating synchronization primitives
Launching cmd.exe command interpreter
Setting browser functions hooks
Unauthorized injection to a system process
Unauthorized injection to a browser process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
net_reactor packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected FormBook
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1449717 Sample: PO#2492150 May 29 2024.exe Startdate: 30/05/2024 Architecture: WINDOWS Score: 100 34 www.tzoganis.com 2->34 36 www.summittaxsolution.com 2->36 38 15 other IPs or domains 2->38 42 Snort IDS alert for network traffic 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 12 other signatures 2->48 11 PO#2492150 May 29 2024.exe 3 2->11         started        signatures3 process4 signatures5 56 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->56 58 Injects a PE file into a foreign processes 11->58 14 PO#2492150 May 29 2024.exe 11->14         started        process6 signatures7 60 Modifies the context of a thread in another process (thread injection) 14->60 62 Maps a DLL or memory area into another process 14->62 64 Sample uses process hollowing technique 14->64 66 Queues an APC in another process (thread injection) 14->66 17 explorer.exe 63 1 14->17 injected process8 dnsIp9 28 www.motivator.world 103.224.212.211, 49740, 80 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 17->28 30 www.jokerslot123apk.club 188.114.96.3, 49738, 49746, 80 CLOUDFLARENETUS European Union 17->30 32 www.tzoganis.com 135.125.233.25, 49739, 80 AVAYAUS United States 17->32 40 System process connects to network (likely due to code injection or exploit) 17->40 21 wlanext.exe 17->21         started        signatures10 process11 signatures12 50 Modifies the context of a thread in another process (thread injection) 21->50 52 Maps a DLL or memory area into another process 21->52 54 Tries to detect virtualization through RDTSC time measurements 21->54 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2024-05-28 22:41:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:fa27 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
cc163b136a2aabb658e5b5a20007e28467332a532381c4ef8f27fb53b61b4b7c
MD5 hash:
74fc507f0a6ba3916837e42a2c77cf02
SHA1 hash:
b5e87c260349295fcb03720dcdea728a046b30e6
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0 Formbook
SH256 hash:
7061e4cc146745b7201a71271730e477da220997e0975ce08c5e4e3f06cc7497
MD5 hash:
47a0b998f7c6e3ba93482f8378ca661f
SHA1 hash:
df3d2b313d4e06d4a7585dd4cbeb0e3c63e6edd9
SH256 hash:
410c191dfc94b64df404070d4df9b162f71450378d7c5d24d9e7ce64ba127e88
MD5 hash:
98c528032fcb600b2d1a428a906ff51f
SHA1 hash:
a2d0aaa1d1563d7990ae0338e0ef66c601d38dcc
SH256 hash:
3605439f7e6573d306f11d1fb484703ea92e84325a53218d704da3d9d5388129
MD5 hash:
7bb92f7b6fc76b42993a259bc39376ad
SHA1 hash:
916cd43e333d2890e3a946f459419e21938cc183
SH256 hash:
78f73e1734daa918b253517c75971fbb8df773a3d77d02a752e9a0ad1711a677
MD5 hash:
f9d2985aa1c41cca281321fffb5ed424
SHA1 hash:
3a7a58d2dcae2762882357ae34d372744b1dbb9d
SH256 hash:
ca285d2b340f7cdc2b495675775d0769decadda571c3858201d9ee44298ede3e
MD5 hash:
b58f5c667e17dfc7676ab4ad6486d4b7
SHA1 hash:
74f1d9439717967e1ed6609fdd6147d7d2ee322b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe ca285d2b340f7cdc2b495675775d0769decadda571c3858201d9ee44298ede3e

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments