MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d6542847f6e753bcb676e6d891d85d88ff5a38fe7150975f53ac5863922a7667. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: d6542847f6e753bcb676e6d891d85d88ff5a38fe7150975f53ac5863922a7667
SHA3-384 hash: d2092aed5a1dfd4d152b41f4d64bf1a03f401715e87bf19b077ae1c501bf1e61480812c53eadd1bd0383a3592915b083
SHA1 hash: 2f2f800cd13d9a690002db25b982ce8ecfce5743
MD5 hash: 12dc89749a1e3d3198a1db81eb134a28
humanhash: beer-illinois-mike-july
File name:DHL Notification_pdf.exe
Download: download sample
Signature Formbook
File size:812'544 bytes
First seen:2022-11-15 11:47:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:rVnc4FLLxFVaioYznyXkgTvftGYnep/2:hnRFLLRoayjtGYng
TLSH T1DB05392DB9BCF412EE3AA9B70EF69A4BCD305141161E811B0D2937DEE8358763D4E44B
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DHL Notification_pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-11-15 12:08:50 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 746867 Sample: DHL Notification_pdf.exe Startdate: 15/11/2022 Architecture: WINDOWS Score: 100 31 www.usclink.life 2->31 33 www.cwdxz.com 2->33 37 Snort IDS alert for network traffic 2->37 39 Multi AV Scanner detection for domain / URL 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 10 other signatures 2->43 10 DHL Notification_pdf.exe 3 2->10         started        signatures3 process4 file5 29 C:\Users\...\DHL Notification_pdf.exe.log, ASCII 10->29 dropped 13 DHL Notification_pdf.exe 10->13         started        16 conhost.exe 10->16         started        18 DHL Notification_pdf.exe 10->18         started        process6 signatures7 55 Modifies the context of a thread in another process (thread injection) 13->55 57 Maps a DLL or memory area into another process 13->57 59 Sample uses process hollowing technique 13->59 61 Queues an APC in another process (thread injection) 13->61 20 explorer.exe 13->20 injected process8 dnsIp9 35 www.k8sb15.live 20->35 45 System process connects to network (likely due to code injection or exploit) 20->45 47 Uses netsh to modify the Windows network and firewall settings 20->47 24 netsh.exe 20->24         started        signatures10 process11 signatures12 49 Modifies the context of a thread in another process (thread injection) 24->49 51 Maps a DLL or memory area into another process 24->51 53 Tries to detect virtualization through RDTSC time measurements 24->53 27 cmd.exe 1 24->27         started        process13
Threat name:
ByteCode-MSIL.Trojan.Leonem
Status:
Malicious
First seen:
2022-11-15 01:44:36 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:g28p rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
12971201b0c68b9106e80e12682fb6a5f76b2c848a50db6a2a0e4c0aa193753a
MD5 hash:
5ae9f6cee551cf8f9230eb5e81ee7a25
SHA1 hash:
8d2fa026eb3130888bb8279255db4c49a691bf52
Detections:
FormBook win_formbook_auto win_formbook_g0
Parent samples :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 hash:
b6cf84a4ffcd5230fccc180d0b8557626a5683e3c74a005611c087b4839ed09b
MD5 hash:
cad070ce1a523ed453c163ed4036880f
SHA1 hash:
81a1361290573dfaaa38bc8119a4a4dba13a466a
SH256 hash:
cfc16a2dbb933b1b85807d48966e9301b9fc34f4c44e7357713ca88b54bf4ab4
MD5 hash:
aabd0bdc81026ade6c57383f21d5c227
SHA1 hash:
4b26936bb8c03be6d7963184215a5ab594ecb765
SH256 hash:
3fe5acafb11feca30cb5fc0e9e9b29abfbf5f3bcff25cea782a4fff489493d81
MD5 hash:
72e6614c6e231827bc9d0c10aec115b4
SHA1 hash:
3f7f4b2302f66a7200fc09750e88445e6c42f0a4
SH256 hash:
ab19f28c700d64814b0c55df868c30dfb94e0a1f9fb6f7bca05bac6eb78a4e52
MD5 hash:
1f2a6c02dcf9aa00a28a5039fb5b8ce0
SHA1 hash:
1ef480867d39b98368af7586a8e6ba38c0c3893a
SH256 hash:
d6542847f6e753bcb676e6d891d85d88ff5a38fe7150975f53ac5863922a7667
MD5 hash:
12dc89749a1e3d3198a1db81eb134a28
SHA1 hash:
2f2f800cd13d9a690002db25b982ce8ecfce5743
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe d6542847f6e753bcb676e6d891d85d88ff5a38fe7150975f53ac5863922a7667

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments