MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ca3afdd3df6970f8026481a1d7800d86ba9852aa6a12325330a91f05aa60fb32. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | ca3afdd3df6970f8026481a1d7800d86ba9852aa6a12325330a91f05aa60fb32 |
|---|---|
| SHA3-384 hash: | 64b05d3f0b8830e56bae9ce12f08f8c1666596ca97776ed810d5917fb6a6982e17a11241d17b2977b82b6b38a4293ec9 |
| SHA1 hash: | 2c742a806f8551a0e6e2c4dc0fec5e0e84741060 |
| MD5 hash: | 07b77c905cc1a5daf3c0212a9b782bcd |
| humanhash: | timing-nevada-seventeen-magnesium |
| File name: | 07b77c905cc1a5daf3c0212a9b782bcd.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'068'032 bytes |
| First seen: | 2022-09-21 13:25:00 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:irQxRa4rpGT77cKzf9yYh+cARwwGkr7i3b8tMPjHLsanQhQIZy5nehYfO:p04FGH4Kj9ZORnGkr7DtMP5MQpev |
| TLSH | T1F0359C1127EA9E03F279A7B1C0E0D43497B56D02E466C38B1FC91CDFB612BD69A81367 |
| TrID | 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.4% (.EXE) Win64 Executable (generic) (10523/12/4) 6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.4% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 74d298b898b0f8b4 (11 x AgentTesla, 11 x SnakeKeylogger, 9 x Formbook) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
299
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
07b77c905cc1a5daf3c0212a9b782bcd.exe
Verdict:
Malicious activity
Analysis date:
2022-09-21 13:25:29 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Verdict:
Malicious
Threat level:
10/10
Confidence:
80%
Tags:
anti-vm packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Formbook
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
Detection:
formbook
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2022-09-21 10:25:59 UTC
File Type:
PE (.Net Exe)
Extracted files:
27
AV detection:
20 of 40 (50.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
10/10
Tags:
family:formbook campaign:ag94 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
2b70a727b76b6d99fb6347896507058fe984c34a5ed2df9e69a145016e0df0a1
MD5 hash:
faae1a1d5356fcf16bb324b2f9636ec6
SHA1 hash:
4c3ea9f966e3b399eb28e06f4e52a4630b9f0fcf
Detections:
FormBook
win_formbook_auto
win_formbook_g0
Parent samples :
9c06bd5e1e9f92ea449869770a41d697dc242e134fc8c72447c1b730301fa418
7570348e9f9c0cbc989a61d195fd847499d64f8c74404f27a5eafe94274bd4d5
8ba4e909de453a9a2417a992da877b8d809c89a675618e574062d7cef6f18b1d
a5fce9acd8aef328e8a659ee64a13cbd13fe0fd813eb7a02cf5a1f2e23d64597
ca3afdd3df6970f8026481a1d7800d86ba9852aa6a12325330a91f05aa60fb32
c0b433e9f4a2438b5647e9e2e236747cc55e931e46da8e52531b1c70786467d2
542e656f422a4cb0c3dd3aab2f0704ffa3d8f8fcbe4be5e5974bca08f896b8d3
7570348e9f9c0cbc989a61d195fd847499d64f8c74404f27a5eafe94274bd4d5
8ba4e909de453a9a2417a992da877b8d809c89a675618e574062d7cef6f18b1d
a5fce9acd8aef328e8a659ee64a13cbd13fe0fd813eb7a02cf5a1f2e23d64597
ca3afdd3df6970f8026481a1d7800d86ba9852aa6a12325330a91f05aa60fb32
c0b433e9f4a2438b5647e9e2e236747cc55e931e46da8e52531b1c70786467d2
542e656f422a4cb0c3dd3aab2f0704ffa3d8f8fcbe4be5e5974bca08f896b8d3
SH256 hash:
49bdf1ed18d453e600a6c7301f1b061f10287420791b8b9feb0369e9dda02f6e
MD5 hash:
3ffbc0acbbb9980bff34a8d6ab1218a6
SHA1 hash:
dbe6a122a17fb0dd8a2953c1e41d12f04520bfd5
SH256 hash:
075cfa6e2d3876c34e7d704b3cfb1ae9d25c0274c9191b246f7884e1fad7b743
MD5 hash:
6b5c2025cf5c3346a0893f33b25f5413
SHA1 hash:
d515f82a8e78f669953bcfda5137eca36466ce7b
SH256 hash:
70dfa4c873605ab0fcdcb62be2a970da110535280d8dc88261edbe1ed2865307
MD5 hash:
d5b0f8aff064b3e828421b48efccd312
SHA1 hash:
724f4bc7ab4e08c45562748b739c8f7496a5ad8f
SH256 hash:
f4ba0a39928f062b5c733c6fe642c6ff444002e621f2b3f6750d636e94752201
MD5 hash:
cdd077d74817b33077eec03b431fc6be
SHA1 hash:
360d10d7589c2be6fd736cea8c015606abfcc7c7
SH256 hash:
ca3afdd3df6970f8026481a1d7800d86ba9852aa6a12325330a91f05aa60fb32
MD5 hash:
07b77c905cc1a5daf3c0212a9b782bcd
SHA1 hash:
2c742a806f8551a0e6e2c4dc0fec5e0e84741060
Malware family:
FormBook
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Formbook
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.