MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e161e6e99cf402f075203ab98962e6c3f043f49f3a342c443f8480ae05898663. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: e161e6e99cf402f075203ab98962e6c3f043f49f3a342c443f8480ae05898663
SHA3-384 hash: a0de51218e51d3ef316987aab0abc146a4a642216e273da788dc81bbec21a0b1edd0c3ff48d4c783dd5ec76b0c5649b6
SHA1 hash: 9139ed113400869c2a3e30d3385807430298e448
MD5 hash: 8620df166d13bc08262eb5a210e29794
humanhash: beryllium-blue-sad-yankee
File name:AWB_NO_#9284730932.exe
Download: download sample
Signature Formbook
File size:813'056 bytes
First seen:2022-08-24 10:16:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'662 x AgentTesla, 19'477 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:ZF6OjPdEw27ROvCs8UzgUTxPiKLm+kDI/c76VxpGdAZDt8VZyKbLE8D:ZFNdEViB8qZP4DORxpO9p
TLSH T1650512487A95F68FC86B8EB689D42C559730E4234F07E353B45723EC5A4E39ACE121E3
TrID 61.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.0% (.SCR) Windows screen saver (13101/52/3)
8.8% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon f0d0b8b4c6c2e4f0 (7 x Formbook)
Reporter pr0xylife
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
322
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
AWB_NO_#9284730932.exe
Verdict:
Malicious activity
Analysis date:
2022-08-24 10:19:07 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Unauthorized injection to a recently created process
Creating a file
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 689422 Sample: AWB_NO_#9284730932.exe Startdate: 24/08/2022 Architecture: WINDOWS Score: 100 36 Multi AV Scanner detection for domain / URL 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for URL or domain 2->40 42 6 other signatures 2->42 10 AWB_NO_#9284730932.exe 3 2->10         started        process3 file4 28 C:\Users\user\...\AWB_NO_#9284730932.exe.log, ASCII 10->28 dropped 52 Tries to detect virtualization through RDTSC time measurements 10->52 14 AWB_NO_#9284730932.exe 10->14         started        signatures5 process6 signatures7 54 Modifies the context of a thread in another process (thread injection) 14->54 56 Maps a DLL or memory area into another process 14->56 58 Sample uses process hollowing technique 14->58 60 Queues an APC in another process (thread injection) 14->60 17 explorer.exe 14->17 injected process8 dnsIp9 30 zjzcmy.net 38.85.250.148, 49747, 80 COGENT-174US United States 17->30 32 www.zjzcmy.net 17->32 34 2 other IPs or domains 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 cmmon32.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-08-24 10:17:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
27 of 39 (69.23%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:s0s2 rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Unpacked files
SH256 hash:
94eb1311e64ddd1441f1820049ce85e110592d08098bd0547324dc965fc52c23
MD5 hash:
a12c44df2adb4e318737cd1ce913d42b
SHA1 hash:
3956b1f7367d3136bae5d96b7814f5e131066c69
Detections:
win_formbook_g0 win_formbook_auto FormBook
Parent samples :
2a9402ebd373051db7907618bccb58b922cdddb871a68987fb1f694527c8dc2b
5c1ea24ac3aab840b98016e4caeb82f55aed493aa3b412cb80c9fb6d6f79d9ad
cad3c55468a545fa192d342b696c573a3d19c36673fd7524e982069fe3bb6109
27d5408961dba9baf42c42b2574c863ccf523ee98fb0648559b733dd52fb37dc
e92fcd822de39355e0d89c4dc59336d4331e3d9b70a6ab54215b8ba637b53af7
cc48a92eedc0b016d5faad9bef8ea4d9831328650cc6f51064c569955b5c2382
d061f19eed59dc92d6ec275adb6b2e0c679bb637518a396384a47d3e184f7c6a
b062a9d743bcc3af9728b50385318d53924a65ad2defffae0ff625b6300280d1
981a126a3d6e3825ba435c9487988fd7a17fec0b7f2528a7229f2ae3a1798800
7d9650c0643e34d7b2485adaba2e2e2171e769d99e61839bda67e38cb595c312
5cbfa0d520be3a7147b437f0b02a3328a569110104a5ea37dcee8c0b8e464737
21f2e5161deb44fb1a6d6c1e043f835893333f90e029bbab3122bd1cc15957a7
8bb6042a5324981df5fc9259ab15da7c6badfb20be1d99cfe987634d9e37ea83
947f2382fc8bc6976d1fd37ac489d9ea783f0a1becfe36d44943596f1178deef
83a39de3decd05ed18f53402e780bb5fbb1d6cd90d916f3821ba338c9cd579d8
8b6765f7849153e97570cb7e438f1ec7934d49de37aaad4132e7f1f45be5fbc7
329b572ec9a7899496a335c8b6fa8a3a697c07cfc1161ca734ef379a33a27c48
a83621a531d4c85f70448ed30a4fca11be7154b28efa5c9853bb34766ac528e9
8cfab7564a09852f6ac15b97c02e63ea07b6099f6d38d39c05b06c8e097e6d31
eded2b81ae40fd2694db87102fbf5d69269de019853bd8062af52a1ac20d6d23
528eeb06e53ab90b33bb403f8b5b89c614c1ceeccbcb18429457dd69821d52cb
d4a853b38027915f1ea1daa506995a272250a5d56573d196ce52060a763e6b64
ef776f82fa51452cb7b8c4b4e8ba7b66481f7fd6f5d36056081ebd1c3326cc68
fe08d4765f0542daa638810065f54c1350df10aff72215191b66df811ab03e5e
fab49681b75999edcaa791c702fc8dabc22071fbc87013846ea9f9b009af4865
3b520fa20ca7de3ec42ddff17915a68c486136893a619d0abf8b6a2902a211e9
64c512b6660421797a005272a4b5e65981657619d28f0d8b27b399d58cd111e5
c8483d4d8ae1ce3227dbc11e8cfaffa8559cce0ea5189adca701c01b0e439cb9
e161e6e99cf402f075203ab98962e6c3f043f49f3a342c443f8480ae05898663
e5699b27604861d602353161493e6f3af720a33440d251d18b6e0f1322e88693
ec0ce1b19008446f177ac30c5bbcf55c714b1f43c7fe473068f562e8428aefc7
SH256 hash:
44743dda09e3d58941f2330a4e3d11641a9cd1cb41306f30dd2575a17ccaec19
MD5 hash:
4e48d643ecc61d79cbff0d725c81ad88
SHA1 hash:
9c53f29dcfb790898ec9d90b8a77547064786e4e
SH256 hash:
019526b26b00b912d42d5e082f8b1965146bc50aa619e913cdeb6492311969c8
MD5 hash:
8ddfae3877734a1fe9badb211ea70b0d
SHA1 hash:
7a62f7e309aaf582b63a4c4ab394e873ecfc1bcb
SH256 hash:
503c72996e933f17ed4c69ae1da9460d796a953d4182a17d0751406a471c891f
MD5 hash:
1cf10d6c11933c6bf5be6dac410866fa
SHA1 hash:
5b2e41baeb7fc8a6c9bade96a731bc1895f913fe
SH256 hash:
e161e6e99cf402f075203ab98962e6c3f043f49f3a342c443f8480ae05898663
MD5 hash:
8620df166d13bc08262eb5a210e29794
SHA1 hash:
9139ed113400869c2a3e30d3385807430298e448
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments