MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2e69fc8667dc36900a0b3499e2084ce8066a6f0912ce44983cd92cb39361bc2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 4 File information Comments

SHA256 hash: e2e69fc8667dc36900a0b3499e2084ce8066a6f0912ce44983cd92cb39361bc2
SHA3-384 hash: 72e4e66048d63b69cc218d2684384e62b1534300a8e1647f029d4fe1f9af347fdf7079058b7db85d738ff5c48231a3a1
SHA1 hash: 54b43ad506d6d04c6d5afacc509e3dcbd12d836b
MD5 hash: cae47515a65d018da49a71d0dbb7959a
humanhash: twelve-pennsylvania-nuts-september
File name:FedEx_24021747701.exe
Download: download sample
Signature Formbook
File size:708'608 bytes
First seen:2024-02-14 13:06:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:4h0eQ5vziHejLBKzt0v9tM1QYpZomRpWdiyOX3w/Ovob4omxD3q:4h0rieL6qvHi/odiyOX3BvoeQ
TLSH T139E412002258B7BAC65957FE94E2168953B6637B23A3EF0AFF8024EE4C53707131D74A
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon ccba71ecccc071b2 (3 x AgentTesla, 3 x Formbook, 1 x RedLineStealer)
Reporter abuse_ch
Tags:exe FedEx FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
301
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
DHL Express_AWB#62098098013.rar
Verdict:
Malicious activity
Analysis date:
2024-02-13 05:54:14 UTC
Tags:
formbook stealer spyware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1392153 Sample: FedEx_24021747701.exe Startdate: 14/02/2024 Architecture: WINDOWS Score: 100 54 www.pulsytech.xyz 2->54 56 www.news-as-bad.online 2->56 58 10 other IPs or domains 2->58 68 Malicious sample detected (through community Yara rule) 2->68 70 Antivirus detection for URL or domain 2->70 72 Sigma detected: Scheduled temp file as task from temp location 2->72 76 7 other signatures 2->76 10 FedEx_24021747701.exe 7 2->10         started        14 KznnYJWQ.exe 5 2->14         started        signatures3 74 Performs DNS queries to domains with low reputation 54->74 process4 file5 50 C:\Users\user\AppData\Roaming\KznnYJWQ.exe, PE32 10->50 dropped 52 C:\Users\user\AppData\Local\...\tmp73E2.tmp, XML 10->52 dropped 88 Uses schtasks.exe or at.exe to add and modify task schedules 10->88 90 Adds a directory exclusion to Windows Defender 10->90 16 FedEx_24021747701.exe 10->16         started        19 powershell.exe 23 10->19         started        21 schtasks.exe 1 10->21         started        92 Multi AV Scanner detection for dropped file 14->92 94 Machine Learning detection for dropped file 14->94 23 KznnYJWQ.exe 14->23         started        25 schtasks.exe 1 14->25         started        signatures6 process7 signatures8 66 Maps a DLL or memory area into another process 16->66 27 AaHdyqyehKfml.exe 16->27 injected 29 WmiPrvSE.exe 19->29         started        31 conhost.exe 19->31         started        33 conhost.exe 21->33         started        35 AaHdyqyehKfml.exe 23->35 injected 38 conhost.exe 25->38         started        process9 signatures10 40 upnpcont.exe 13 27->40         started        78 Maps a DLL or memory area into another process 35->78 43 upnpcont.exe 35->43         started        process11 signatures12 80 Tries to steal Mail credentials (via file / registry access) 40->80 82 Tries to harvest and steal browser information (history, passwords, etc) 40->82 84 Writes to foreign memory regions 40->84 86 3 other signatures 40->86 45 AaHdyqyehKfml.exe 40->45 injected 48 firefox.exe 40->48         started        process13 dnsIp14 60 www.pulsytech.xyz 66.29.149.46, 49731, 49732, 49733 ADVANTAGECOMUS United States 45->60 62 www.dolceitalyescorts.com 185.27.134.60, 49727, 49728, 49729 WILDCARD-ASWildcardUKLimitedGB United Kingdom 45->62 64 7 other IPs or domains 45->64
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-02-13 02:34:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
7
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Unpacked files
SH256 hash:
a910e8639fb527e5062537f8cdb5dc8e700104b5752900083ba836d056d5a7fa
MD5 hash:
984c799a3e697fbae6d9d48d277beae9
SHA1 hash:
35b2af9bd4a9cc6ccda59b2dede65d9b491ff10f
Detections:
win_formbook_w0 win_formbook_g0
SH256 hash:
c4ad3351d04ce6d339969f5682c1978420041aba7a2084a33178e50c62746d86
MD5 hash:
5adca6a717e1b4517cd2ffb2a69981de
SHA1 hash:
4db158aaa7f572e383133263feb7bd26f37ca7cd
SH256 hash:
0c68264370ac9ff98387d73ce3f2c88e187729bfcea0c984cb370d1097cfb2e4
MD5 hash:
47d8ad55cc18078cc513c50fb47d3335
SHA1 hash:
65931a98340c65a7aace74619368dee616b12137
SH256 hash:
f18bc33f9a3626824f7aef1c6ed448f2659ede52bbcf8b52e11ec50b5602945a
MD5 hash:
d51e23542ff3281bb93cc448abc8a0d2
SHA1 hash:
4c6dc38fa978ca60471e2671406b28d622721d39
SH256 hash:
3dff12ee9183149386bfb90aa8bb671f57201de4e1157b79dd22fea45d837562
MD5 hash:
02e3968ff81ca78205efb912d981ea81
SHA1 hash:
0846251d2774064940f11617e1b15b2eb63834aa
SH256 hash:
e9db2d4cf240b79cdf9b4046ea3fd9b801e7a41914ab9d4377fbde45d8615a9f
MD5 hash:
73fdc7b4d67628db3c61d0e069c2bc0f
SHA1 hash:
d673cc1930f03ea234beb0c472956ff9fe0f1f68
SH256 hash:
0e97f9e4f2ca6c2431b9e59c45899c35922caca27126f1d0331a534b0f6e5eb8
MD5 hash:
6ad373f281328f5cccf7182af6ef7c02
SHA1 hash:
82e2434068c02758317112e794a8e809c8bfb538
SH256 hash:
b53db799a76ff38512ccd03299bedc8da38eebaa99c678d5606574df0fe94084
MD5 hash:
5cac8402acfba9332042e940a3606c00
SHA1 hash:
6c7f13266000fcd0a2d9a0e4a4e4f0c31f5ba220
SH256 hash:
dd680e3e8155a656a7cdc8b07fdbd92e049b9c30742689fda6d6e58ee757bc48
MD5 hash:
7d69cdff7867957e845a127544222914
SHA1 hash:
663b481a4f5265fff33018543c6463410eb5ef4e
SH256 hash:
1b631f6035d6b38103b53aef4284960bb11ab587e4cedd10a98e1b17aaa77bf3
MD5 hash:
bd9a92cf4fc2cbcdab1c3fd647d74c1b
SHA1 hash:
0f6513d2139fecf144eed0281818a3b382b5ebdf
SH256 hash:
efac39be2a816d413b922a8459b11173b17951060815dcdb057b2b5a8fe562e4
MD5 hash:
1bd71a437511f28ae133255b91ab0349
SHA1 hash:
073b257a2129867782ed72bdc98f659273f9ffa7
SH256 hash:
e2e69fc8667dc36900a0b3499e2084ce8066a6f0912ce44983cd92cb39361bc2
MD5 hash:
cae47515a65d018da49a71d0dbb7959a
SHA1 hash:
54b43ad506d6d04c6d5afacc509e3dcbd12d836b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments