MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc28684bf9bab25ac4e38be61f2985ed7982bb54ec24304917c8a02affc84b70. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: dc28684bf9bab25ac4e38be61f2985ed7982bb54ec24304917c8a02affc84b70
SHA3-384 hash: 1a178fec3b9d34b2a571e5cf704b3d6de42bafbb7ff0cdcd657b471f3f74e16dfba2e7450316aa5134f6a5cfd55feed5
SHA1 hash: a6b3d9793f03a75fb353c251ebdf9f9812b23554
MD5 hash: d5bf6d80b927d780b23f97e814ae8743
humanhash: london-berlin-orange-happy
File name:DHL Notification_pdf.exe
Download: download sample
Signature Formbook
File size:931'328 bytes
First seen:2022-10-12 13:17:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:Dearup/1zvnT+ZHac2E3y0nz34pCRpDki9WLGsilJqkOFGYcWjwSvd9dTvZ+J363:nUzvT+j3ySv4qTqkOHjw
TLSH T105156B7A2192650FD416B135C8C7DAF32AFB6D617112C1C796D32F6FBC480BF9A02296
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0c4c4a4c4cb4b4b4 (26 x SnakeKeylogger, 9 x Formbook, 5 x AgentTesla)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 721723 Sample: DHL Notification_pdf.exe Startdate: 12/10/2022 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 8 other signatures 2->42 10 DHL Notification_pdf.exe 3 2->10         started        process3 file4 28 C:\Users\...\DHL Notification_pdf.exe.log, ASCII 10->28 dropped 52 Injects a PE file into a foreign processes 10->52 14 DHL Notification_pdf.exe 10->14         started        signatures5 process6 signatures7 54 Modifies the context of a thread in another process (thread injection) 14->54 56 Maps a DLL or memory area into another process 14->56 58 Sample uses process hollowing technique 14->58 60 Queues an APC in another process (thread injection) 14->60 17 explorer.exe 14->17 injected process8 dnsIp9 30 www.ecolabspeyua.store 185.104.45.94, 49699, 80 UKRAINE-ASUA Ukraine 17->30 32 spartanburgwebdesign.com 82.180.175.43, 49700, 80 BROADCOMDK Denmark 17->32 34 2 other IPs or domains 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 control.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       
Threat name:
Win32.Spyware.SnakeLogger
Status:
Malicious
First seen:
2022-10-12 11:11:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
21
AV detection:
20 of 26 (76.92%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:g28p rat spyware stealer trojan
Behaviour
Gathers network information
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
12971201b0c68b9106e80e12682fb6a5f76b2c848a50db6a2a0e4c0aa193753a
MD5 hash:
5ae9f6cee551cf8f9230eb5e81ee7a25
SHA1 hash:
8d2fa026eb3130888bb8279255db4c49a691bf52
Detections:
FormBook win_formbook_auto win_formbook_g0
Parent samples :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 hash:
f1ab98495d98cb081f37b9e5edc1b30fdd347ab93a07df1b3851e7de8822ea98
MD5 hash:
095fd0539ba0c15fc99537b84f1fc3fc
SHA1 hash:
dcde9e878c983d7a357666d0ad5965cb0b392661
SH256 hash:
af7ac1171b44c9a949ad80bfaf05095048d0b74cfb527f66479e22f47d340110
MD5 hash:
f696dc0e00cb8f70799ac3fcaa5f9f6a
SHA1 hash:
cde2283de5b89639ea52f6388feef8f77efc63ce
SH256 hash:
3657933b068102830df229bf68f0ad2ba97202095b6c8a93a3bea6ce6e970908
MD5 hash:
28e84103c7f4062f0c4b2e355c53abbf
SHA1 hash:
6dece7fe2b182c9501d2295a4be151344310ba49
SH256 hash:
edadc813f4440ada276da601d8f31780e5e138b8ee392e3f49a509322a1fb51e
MD5 hash:
574597554c69083c1af2b742a97a92b6
SHA1 hash:
043eea660b8650c5a0042f842fd8db3516d37a2c
SH256 hash:
dc28684bf9bab25ac4e38be61f2985ed7982bb54ec24304917c8a02affc84b70
MD5 hash:
d5bf6d80b927d780b23f97e814ae8743
SHA1 hash:
a6b3d9793f03a75fb353c251ebdf9f9812b23554
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments