MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc48a92eedc0b016d5faad9bef8ea4d9831328650cc6f51064c569955b5c2382. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: cc48a92eedc0b016d5faad9bef8ea4d9831328650cc6f51064c569955b5c2382
SHA3-384 hash: 719800b7805cba909ee65fe63a3f4114a6922192c8481c02291b64483712e339453b5fcd15bf98b7f1a3228afff7aace
SHA1 hash: e643b711718223ae35aea1c91bedcb3464cad482
MD5 hash: 9c2d7d1d32d96adb3a53a4d060fb0ed1
humanhash: mexico-angel-west-xray
File name:Remittance_90523_03.exe
Download: download sample
Signature Formbook
File size:1'873'408 bytes
First seen:2022-06-25 13:21:03 UTC
Last seen:2022-07-04 08:24:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:CtK6zYbHCHVHCKGGbnZckBQ9vVcW+WRptQg9ieVxLvOAo:CxzYVGDOv5o
TLSH T154854E073280652EE80C5AF5B8F78E2466D8D5E91763EFC3154CE3762B467A8BD42273
TrID 69.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.9% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0c32696d556d393c (6 x Formbook)
Reporter 0xToxin
Tags:exe FormBook RAT s0s2

Intelligence


File Origin
# of uploads :
3
# of downloads :
349
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Remittance_90523_03.exe
Verdict:
Malicious activity
Analysis date:
2022-06-25 13:15:28 UTC
Tags:
formbook

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 652253 Sample: Remittance_90523_03.exe Startdate: 25/06/2022 Architecture: WINDOWS Score: 100 38 Snort IDS alert for network traffic 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Antivirus detection for URL or domain 2->42 44 8 other signatures 2->44 10 Remittance_90523_03.exe 3 2->10         started        process3 file4 30 C:\Users\user\...\Remittance_90523_03.exe.log, ASCII 10->30 dropped 54 Tries to detect virtualization through RDTSC time measurements 10->54 14 Remittance_90523_03.exe 10->14         started        signatures5 process6 signatures7 56 Modifies the context of a thread in another process (thread injection) 14->56 58 Maps a DLL or memory area into another process 14->58 60 Sample uses process hollowing technique 14->60 62 Queues an APC in another process (thread injection) 14->62 17 explorer.exe 14->17 injected process8 dnsIp9 32 nonnydesigns.com 199.188.200.196, 49841, 80 NAMECHEAP-NETUS United States 17->32 34 www.wojiayouxuan.com 17->34 36 www.nonnydesigns.com 17->36 46 System process connects to network (likely due to code injection or exploit) 17->46 21 wlanext.exe 17->21         started        24 autofmt.exe 17->24         started        signatures10 process11 signatures12 48 Modifies the context of a thread in another process (thread injection) 21->48 50 Maps a DLL or memory area into another process 21->50 52 Tries to detect virtualization through RDTSC time measurements 21->52 26 cmd.exe 1 21->26         started        process13 process14 28 conhost.exe 26->28         started       
Threat name:
ByteCode-MSIL.Trojan.Swotter
Status:
Malicious
First seen:
2022-06-25 06:43:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
23 of 41 (56.10%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:s0s2 rat spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook Payload
Formbook
suricata: ET MALWARE FormBook CnC Checkin (GET)
Unpacked files
SH256 hash:
94eb1311e64ddd1441f1820049ce85e110592d08098bd0547324dc965fc52c23
MD5 hash:
a12c44df2adb4e318737cd1ce913d42b
SHA1 hash:
3956b1f7367d3136bae5d96b7814f5e131066c69
Detections:
win_formbook_g0 win_formbook_auto FormBook
Parent samples :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 hash:
7b48a2aae47758bcdbb77bf2748c32824a9484e7b7f2590e123e33892cbfefde
MD5 hash:
3109ba26b4b8cf6eb05a2538bcc4dc19
SHA1 hash:
686ad4ea26367c63cdba31b01dbac9d89c95dc3d
SH256 hash:
5b58a0566a6c5ead58d640d5a9d6869fa936755da420b6d4028096cb067bac68
MD5 hash:
c96178dbbe505f8bf8dc90678202c27f
SHA1 hash:
1202934c9d01cadf3ca57e7c572e1582bc481656
SH256 hash:
0d8f5c8ec491b768b4a24b4004f4ef3d358b3fc22abbb1c429ee80e43f73bf8d
MD5 hash:
6297ff1b4376e8b2a1c0a0fbdc37ba83
SHA1 hash:
0c47b9a30a34d853379d073362d3d9e28a5997d7
SH256 hash:
cc48a92eedc0b016d5faad9bef8ea4d9831328650cc6f51064c569955b5c2382
MD5 hash:
9c2d7d1d32d96adb3a53a4d060fb0ed1
SHA1 hash:
e643b711718223ae35aea1c91bedcb3464cad482
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe cc48a92eedc0b016d5faad9bef8ea4d9831328650cc6f51064c569955b5c2382

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments