MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d2b52bb53b70d2c91072c917fec7a81ab9de2384eafd1abe8c66e85f5b3e85ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: d2b52bb53b70d2c91072c917fec7a81ab9de2384eafd1abe8c66e85f5b3e85ca
SHA3-384 hash: b7a072b654bdc8111931af071b6d9aee93f3e98eb6d7e769c0def3962c9c89cc1d8991218ca672e081d7668c28923e91
SHA1 hash: 0e05197126826f024bb5dcdbcfac4333b71e7bd2
MD5 hash: c4dda327f0195a7aa33a249f3c1088c3
humanhash: oven-earth-kitten-lemon
File name:RFQ # 1045981 - MAA_D Plant Project r01.exe
Download: download sample
Signature Formbook
File size:783'872 bytes
First seen:2023-06-14 09:18:03 UTC
Last seen:2023-06-15 21:15:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'793 x AgentTesla, 19'692 x Formbook, 12'274 x SnakeKeylogger)
ssdeep 12288:+S8dPpfZrtXyoxD47MDh1uq/ImveARH4UoQpEw7M+afPJg1yEXqXdV:4RpfZrNyG47g13zuU2Vfa1y4qXdV
Threatray 1'666 similar samples on MalwareBazaar
TLSH T125F4120DB69A4CB3CABD0AF8D04212B0C7F69156614AF7C52C9FB4F995E2F9C0C56983
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter cocaman
Tags:exe FormBook RFQ

Intelligence


File Origin
# of uploads :
2
# of downloads :
270
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ # 1045981 - MAA_D Plant Project r01.exe
Verdict:
No threats detected
Analysis date:
2023-06-14 09:20:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Sending a custom TCP request
Launching a process
Creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
comodo formbook packed remcos
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
72 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Leonem
Status:
Malicious
First seen:
2023-06-14 09:18:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
bcdf6407de5f7a6c9e2a5cd8d5d05acc08739585c4fc626c4e4cc1dec995d462
MD5 hash:
ca7c7722dd3923ddd9cf6d411d0a970a
SHA1 hash:
bed4d764bccfb3be1389eb735bc91c7685757cdc
SH256 hash:
35c6caf0889aee0f6c6f261c3d061989cda9032ccff0f5955316052f4bad392d
MD5 hash:
49c7bc64f42adbf1efde597ef952a0eb
SHA1 hash:
ebb625bee61decc0775fb45afa7267c04add5be3
SH256 hash:
52f358d201e81d3a0391cedd3042e2f957555b77aa49559f7fb810bbb7673ba1
MD5 hash:
c785ddc46141af772c75101d17c46a41
SHA1 hash:
e248723b6f60cc7607980d07172b64c33b2b2f15
SH256 hash:
a85c85a94a69294e3541c22112da539864d2f91c732cec7a1a163964556217f7
MD5 hash:
6196b0aee115fdcc1d7e28e10515923b
SHA1 hash:
a2ac9510fccd20ad3b880caa6d15bc346460a81f
SH256 hash:
d6d27ed1939b8527bfaab77b5cda589e3cdc842639958f7b4b63aed35ac7a7ab
MD5 hash:
72b601a1609673f221ca537200e6f074
SHA1 hash:
9bd391169223d5d967cbda11e237b68204cb8511
SH256 hash:
d2b52bb53b70d2c91072c917fec7a81ab9de2384eafd1abe8c66e85f5b3e85ca
MD5 hash:
c4dda327f0195a7aa33a249f3c1088c3
SHA1 hash:
0e05197126826f024bb5dcdbcfac4333b71e7bd2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe d2b52bb53b70d2c91072c917fec7a81ab9de2384eafd1abe8c66e85f5b3e85ca

(this sample)

Comments