MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d4688e6e5455d4601d2988f805b8e1652def668899185a6c179827f13e72941a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: d4688e6e5455d4601d2988f805b8e1652def668899185a6c179827f13e72941a
SHA3-384 hash: 3f1106eafcde133637f7745ee03abd71dea5850bde8207598fb8b7ec6d7cd2dd4eab145e0c740d5b6ad3e1bd4931d974
SHA1 hash: b52a3238b8ee90cac76e9697fac845aa55d8e122
MD5 hash: c409d1a3f0d5d901c207990858a922d3
humanhash: utah-louisiana-nine-nine
File name:Midnight.exe
Download: download sample
Signature Formbook
File size:1'853'712 bytes
First seen:2022-05-20 13:42:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ced282d9b261d1462772017fe2f6972b (127 x Formbook, 113 x GuLoader, 70 x RemcosRAT)
ssdeep 49152:Tdfss+0DMmRufGCiL5ud1OfWgppNgVZf:TVRZ2fGDI6WupNgVB
Threatray 29 similar samples on MalwareBazaar
TLSH T16085333A23362C74DE75CC7EAD5B940923434366551CBFAB4320AE7AFBDD501A2EC192
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon f0f0e8e1caeac4f0 (2 x Formbook)
Reporter JaffaCakes118
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
321
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Midnight.exe
Verdict:
Malicious activity
Analysis date:
2022-05-20 13:41:20 UTC
Tags:
evasion trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% directory
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Moving a file to the %AppData% subdirectory
Creating a window
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Sending an HTTP GET request
Creating a file
Creating a file in the %temp% directory
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
buer clipbanker control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Contains functionality to inject code into remote processes
Creates multiple autostart registry keys
Injects a PE file into a foreign processes
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 631123 Sample: Midnight.exe Startdate: 20/05/2022 Architecture: WINDOWS Score: 100 43 Antivirus / Scanner detection for submitted sample 2->43 45 Multi AV Scanner detection for dropped file 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 2 other signatures 2->49 7 Midnight.exe 10 2->7         started        process3 file4 31 C:\Users\user\...\skazkalzt_crypted.exe, PE32 7->31 dropped 33 C:\Users\user\AppData\Roaming\Sihost67.exe, PE32+ 7->33 dropped 35 C:\Users\user\AppData\...\Salvity_crypted.exe, PE32 7->35 dropped 10 Salvity_crypted.exe 1 7->10         started        13 skazkalzt_crypted.exe 1 7->13         started        15 Sihost67.exe 16 2 7->15         started        process5 dnsIp6 55 Multi AV Scanner detection for dropped file 10->55 57 Contains functionality to inject code into remote processes 10->57 59 Writes to foreign memory regions 10->59 19 AppLaunch.exe 15 3 10->19         started        23 conhost.exe 10->23         started        61 Allocates memory in foreign processes 13->61 63 Injects a PE file into a foreign processes 13->63 25 conhost.exe 13->25         started        27 AppLaunch.exe 13->27         started        41 api.telegram.org 149.154.167.220, 443, 49730 TELEGRAMRU United Kingdom 15->41 29 C:\Users\user\AppData\...\csrss.exe (copy), PE32+ 15->29 dropped 65 Creates multiple autostart registry keys 15->65 file7 signatures8 process9 dnsIp10 37 ip-api.com 208.95.112.1, 49738, 80 TUT-ASUS United States 19->37 39 192.168.2.1 unknown unknown 19->39 51 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->51 53 May check the online IP address of the machine 19->53 signatures11
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2022-05-20 13:43:14 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
22 of 41 (53.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
951e7666425b5751da1c1945e550423238a4017206f7afda0219aeaf765f23a2
MD5 hash:
d01cc6b797bf0149a53ebc3a01a4aec5
SHA1 hash:
42d19b6e24c2d7edf18ce8286250e5d158ff33f9
SH256 hash:
b58788c80bff299fc6bf5fb8e7d237642ea436110155c29d16d2da67353bf1e3
MD5 hash:
1ecc616748ef4af9c8c3af50369e4bde
SHA1 hash:
223aad55e5710af34de720456a5f9a9242f274fc
SH256 hash:
f292f8b3eb262a707380cade972a5515f40a0638063c86a206df12bc98afae73
MD5 hash:
0ae67785c2cf5bc6b98f9cd29d3bf720
SHA1 hash:
2e8a99555566f2b9bd64f04361b21d48ed1d0154
SH256 hash:
d4688e6e5455d4601d2988f805b8e1652def668899185a6c179827f13e72941a
MD5 hash:
c409d1a3f0d5d901c207990858a922d3
SHA1 hash:
b52a3238b8ee90cac76e9697fac845aa55d8e122
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_EXE_Packed_ConfuserEx_Custom
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Custom; outside of GIT
Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_NET_NAME_ConfuserEx
Author:Arnim Rupp
Description:Detects ConfuserEx packed file
Reference:https://github.com/yck1509/ConfuserEx

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Formbook

Executable exe d4688e6e5455d4601d2988f805b8e1652def668899185a6c179827f13e72941a

(this sample)

  
Delivery method
Distributed via web download

Comments