MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e28fb1a3afa196f54c1a3928afee6932b99e5e363bcaac31a57881e58f3ccbd8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 8 File information Comments

SHA256 hash: e28fb1a3afa196f54c1a3928afee6932b99e5e363bcaac31a57881e58f3ccbd8
SHA3-384 hash: 3cc4f30da0cea890f8532f4a1cfa36505bb964628eea08b3ebbf4598fc96cd1664a2b1b65fcc46930c5fbbb0bba1f466
SHA1 hash: 5137e9e058e429c61f9d1b6d063ce7f1df854ac5
MD5 hash: 71c18e8274447c67c89c7b48956199be
humanhash: batman-high-cat-bluebird
File name:z108272615262526254.exe
Download: download sample
Signature Formbook
File size:926'208 bytes
First seen:2023-06-07 11:28:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 56b9ee34a3c873bea4afe3c0ca147de8 (4 x ModiLoader, 1 x Formbook)
ssdeep 12288:l/AeU0+lRGAb9ROvbNuMmUn/LR4q8M+nqwtv07H1O9noM5:lIBljROVrn9J8M+nqwh07w
TLSH T18115CF22B1A05C77EB6B2B39DD1B5674983D7E202B0C983E5AE87E0C2F3425574642F7
TrID 84.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.2% (.SCR) Windows screen saver (13097/50/3)
2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 81a8e0c4c4c2c400 (8 x ModiLoader, 2 x FormBook, 1 x AveMariaRAT)
Reporter FXOLabs
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
BR BR
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
z108272615262526254.exe
Verdict:
Malicious activity
Analysis date:
2023-06-07 11:31:12 UTC
Tags:
dbatloader formbook xloader trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Launching cmd.exe command interpreter
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware keylogger lolbin overlay packed remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Steal Google chrome login data
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 883236 Sample: z108272615262526254.exe Startdate: 07/06/2023 Architecture: WINDOWS Score: 100 88 Snort IDS alert for network traffic 2->88 90 Multi AV Scanner detection for domain / URL 2->90 92 Found malware configuration 2->92 94 6 other signatures 2->94 10 z108272615262526254.exe 1 3 2->10         started        process3 dnsIp4 72 web.fe.1drv.com 10->72 74 ph-files.fe.1drv.com 10->74 76 2 other IPs or domains 10->76 48 C:\Users\Public\Libraries\Mzzpizfa.exe, PE32 10->48 dropped 50 C:\Users\...\Mzzpizfa.exe:Zone.Identifier, ASCII 10->50 dropped 120 Creates multiple autostart registry keys 10->120 122 Writes to foreign memory regions 10->122 124 Allocates memory in foreign processes 10->124 126 2 other signatures 10->126 15 logagent.exe 10->15         started        file5 signatures6 process7 signatures8 128 Modifies the context of a thread in another process (thread injection) 15->128 130 Maps a DLL or memory area into another process 15->130 132 Sample uses process hollowing technique 15->132 134 2 other signatures 15->134 18 explorer.exe 13 10 15->18 injected process9 dnsIp10 52 www.gografic.com 51.89.70.16, 49712, 80 OVHFR France 18->52 54 www.campingshare.net 192.64.119.254, 49721, 49722, 80 NAMECHEAP-NETUS United States 18->54 56 26 other IPs or domains 18->56 46 C:\Users\user\AppData\...\znipf6fdj070.exe, PE32 18->46 dropped 96 System process connects to network (likely due to code injection or exploit) 18->96 98 Benign windows process drops PE files 18->98 23 Mzzpizfa.exe 18->23         started        27 cmmon32.exe 1 12 18->27         started        29 Mzzpizfa.exe 18->29         started        31 3 other processes 18->31 file11 signatures12 process13 dnsIp14 58 192.168.2.1 unknown unknown 23->58 60 web.fe.1drv.com 23->60 68 3 other IPs or domains 23->68 100 Multi AV Scanner detection for dropped file 23->100 102 Writes to foreign memory regions 23->102 104 Allocates memory in foreign processes 23->104 33 SndVol.exe 23->33         started        62 www.vehiclesbeenrecord.com 27->62 64 www.protections-clients.info 27->64 106 Tries to steal Mail credentials (via file / registry access) 27->106 108 Creates multiple autostart registry keys 27->108 110 Tries to harvest and steal browser information (history, passwords, etc) 27->110 118 2 other signatures 27->118 36 cmd.exe 27->36         started        38 cmd.exe 27->38         started        66 web.fe.1drv.com 29->66 70 3 other IPs or domains 29->70 112 Creates a thread in another existing process (thread injection) 29->112 114 Injects a PE file into a foreign processes 29->114 40 colorcpl.exe 29->40         started        116 Tries to detect virtualization through RDTSC time measurements 31->116 signatures15 process16 signatures17 78 Modifies the context of a thread in another process (thread injection) 33->78 80 Maps a DLL or memory area into another process 33->80 82 Sample uses process hollowing technique 33->82 84 Tries to harvest and steal browser information (history, passwords, etc) 36->84 42 conhost.exe 36->42         started        44 conhost.exe 38->44         started        86 Tries to detect virtualization through RDTSC time measurements 40->86 process18
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2023-06-07 06:41:19 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:modiloader family:xloader campaign:uj3c loader persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Reads user/profile data of web browsers
ModiLoader Second Stage
Xloader payload
Formbook
ModiLoader, DBatLoader
Xloader
Unpacked files
SH256 hash:
e28fb1a3afa196f54c1a3928afee6932b99e5e363bcaac31a57881e58f3ccbd8
MD5 hash:
71c18e8274447c67c89c7b48956199be
SHA1 hash:
5137e9e058e429c61f9d1b6d063ce7f1df854ac5
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe e28fb1a3afa196f54c1a3928afee6932b99e5e363bcaac31a57881e58f3ccbd8

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments