MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cad8d95932c19fea9bd88b73c887779763061215920a0c796410701d93d63421. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: cad8d95932c19fea9bd88b73c887779763061215920a0c796410701d93d63421
SHA3-384 hash: dcf687a56ec1a9805d4ea4af5ee3cd8785267f2740190ba1bb8c2e0c02feb6c6976573e0e1510fd365ed9bc0b66bc2bc
SHA1 hash: 635827e18c5864794b3a1f083515867c02648aeb
MD5 hash: acc17e62c8a233a4399ed77bbe33666e
humanhash: berlin-berlin-mobile-floor
File name:ORDECHO-DD230007B.exe
Download: download sample
Signature Formbook
File size:730'112 bytes
First seen:2024-04-28 09:22:11 UTC
Last seen:2024-04-28 10:35:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:DNgLeFR6oXlv312Z3kWi8AbqgHX2FXFdfyXx7UM72WZz0fIzZAK6ABDtQiegJ:VXJ312ZBi8AOgHXSdo7UY2WmfIzZJ6sH
TLSH T12CF4235873F5B902C27DABF8087559085772F94A3931C2EC5E8366CE49D2B05A7E0B3B
TrID 61.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.1% (.SCR) Windows screen saver (13097/50/3)
8.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon ccd444444444d4d4 (6 x Formbook, 4 x AgentTesla)
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
296
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cad8d95932c19fea9bd88b73c887779763061215920a0c796410701d93d63421.exe
Verdict:
Malicious activity
Analysis date:
2024-04-28 09:37:35 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected FormBook
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1432839 Sample: ORDECHO-DD230007B.exe Startdate: 28/04/2024 Architecture: WINDOWS Score: 100 40 www.ty8yd.us 2->40 42 www.tehranrizcomputer.com 2->42 44 2 other IPs or domains 2->44 68 Snort IDS alert for network traffic 2->68 70 Malicious sample detected (through community Yara rule) 2->70 72 Antivirus detection for URL or domain 2->72 74 8 other signatures 2->74 10 ORDECHO-DD230007B.exe 4 2->10         started        13 chrome.exe 9 2->13         started        signatures3 process4 dnsIp5 80 Adds a directory exclusion to Windows Defender 10->80 82 Injects a PE file into a foreign processes 10->82 16 ORDECHO-DD230007B.exe 10->16         started        19 powershell.exe 23 10->19         started        58 192.168.2.9, 138, 443, 49311 unknown unknown 13->58 60 192.168.2.4 unknown unknown 13->60 62 239.255.255.250 unknown Reserved 13->62 21 chrome.exe 13->21         started        signatures6 process7 dnsIp8 64 Maps a DLL or memory area into another process 16->64 24 khscBlcrvMSPzTDJHv.exe 16->24 injected 66 Loading BitLocker PowerShell Module 19->66 27 conhost.exe 19->27         started        29 WmiPrvSE.exe 19->29         started        52 www.google.com 142.251.111.104, 443, 49713, 49714 GOOGLEUS United States 21->52 54 142.251.111.105, 443, 49730 GOOGLEUS United States 21->54 56 6 other IPs or domains 21->56 signatures9 process10 signatures11 78 Found direct / indirect Syscall (likely to bypass EDR) 24->78 31 cttune.exe 13 24->31         started        process12 signatures13 84 Tries to steal Mail credentials (via file / registry access) 31->84 86 Tries to harvest and steal browser information (history, passwords, etc) 31->86 88 Modifies the context of a thread in another process (thread injection) 31->88 90 2 other signatures 31->90 34 khscBlcrvMSPzTDJHv.exe 31->34 injected 38 firefox.exe 31->38         started        process14 dnsIp15 46 tehranrizcomputer.com 87.107.55.55, 49742, 49743, 49744 SINET-ASAccessServiceProviderIR Iran (ISLAMIC Republic Of) 34->46 48 www.ty8yd.us 91.195.240.123, 49740, 80 SEDO-ASDE Germany 34->48 50 www.coppercookwarekitchen.com 35.215.179.87, 49748, 49749, 49750 GOOGLE-2US United States 34->50 76 Found direct / indirect Syscall (likely to bypass EDR) 34->76 signatures16
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-04-24 04:41:23 UTC
File Type:
PE (.Net Exe)
Extracted files:
6
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Unpacked files
SH256 hash:
d5ec3361780069e58b74213a64286f41bbbde92c644832260ae6edfd0f359015
MD5 hash:
c565794380447d8c403b0c7b9a188ac5
SHA1 hash:
170f98013015211918254f20335e3dc00c8f1ff8
Detections:
win_formbook_w0 win_formbook_g0
SH256 hash:
102dd4ea2c29316b66fd1af649bba84e762451a3bd3f7859d60a36245bb9a038
MD5 hash:
9180ab9aabd69f4f702f3a6f24eed965
SHA1 hash:
c9afd2acabc0e6aa898e7ffa418677eabd7152d5
SH256 hash:
4e93120723fe2ace9f2db3ea185c24fc3a48443ca39ce20c1cbf8d73c2f89c63
MD5 hash:
0ae182a85aeb3540f7ef51669b9bdb2e
SHA1 hash:
f59ba5bb33ebecc9367896d2d1fa85e06f293460
SH256 hash:
1c633f39a192f108f755e0bcf412e8489ad80781f3b7807c80892deb2526ff0d
MD5 hash:
e4b5d57e9e46a4e76075b5b92f71577f
SHA1 hash:
d76dc165724148193c6911cc75fc62c198737d3a
SH256 hash:
a3de65d9607fa28995b6d60b0ad501d36107454865c7a74e8121ec11320ae565
MD5 hash:
7dfefede4d4b4d15fe2c4d83996e9e1a
SHA1 hash:
62e0258f0a8d23d17225ff7ad0b304ab12a9fd6a
SH256 hash:
ed95df06435b4126ff46b254ad974fd9f6797f0c2832bc005286e88d6c49ffdd
MD5 hash:
64fa632541e47b9c050ab47d5220a818
SHA1 hash:
ee21aee2fb41765ae92c460d7fcf73bad2be58f0
SH256 hash:
6946ade5583f2586e6a5efca59cb4d61c8666c59f21ec412ab4aeb18d7757d21
MD5 hash:
2db298d5658fb0de64bb776e10d7074a
SHA1 hash:
468c2b4d9994516aecab733a3aad091243dd54bc
SH256 hash:
93b6ef161daa8be7487bbb6790e711eb8a25f0a512ee2a887407b1a23e73ee3e
MD5 hash:
e7af76be8e4bc0bd3092554b6723ff1c
SHA1 hash:
3f8eef68ef9990c64b41f913f5395adf81476337
SH256 hash:
d2ce35627e5d1f216eb2e983b7e6cbf74bcdb3158efa44a87416d303e73f6113
MD5 hash:
95c2861389eb216c8ac726d9b6c0ce8b
SHA1 hash:
33b774cc24c2ff75196c1ceeee0b45a3d787b4d8
SH256 hash:
92847489cd196ace17aa3af143b5cb5d1bfbba6df81a6fd7ac46f059779f5f02
MD5 hash:
e32186ad6cab522f328e918394110baf
SHA1 hash:
2670696ce3329035fc9d01d6678d24470fee3fe5
SH256 hash:
c6e1143bf877ef1c5fdc411b22fce29b9f49512b1cb5c85fa3b5a02051af0a16
MD5 hash:
5217bbca92db5f838516266f0064502f
SHA1 hash:
0a477be39af67c06c4ca5683a1819535516f1a7d
SH256 hash:
cad8d95932c19fea9bd88b73c887779763061215920a0c796410701d93d63421
MD5 hash:
acc17e62c8a233a4399ed77bbe33666e
SHA1 hash:
635827e18c5864794b3a1f083515867c02648aeb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments