MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3d098c75b7d9ac2bcc0a77d244775131d0993d46145621e4b1dd40f2023fded. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: e3d098c75b7d9ac2bcc0a77d244775131d0993d46145621e4b1dd40f2023fded
SHA3-384 hash: 5971ed4adba8fb2c047164d3564272c4c98fd997cd8b7134f8ea4fc9cf1cc2f7b82f0c9c14737603c9ab1b9ee37d492a
SHA1 hash: 64ec5f4c19f5eb03cc11a3119e5ea84ffd963134
MD5 hash: 85300cb7688b8494633557f6b18f3c7b
humanhash: batman-oklahoma-asparagus-north
File name:REVISED PROFORMA INVOICE.exe
Download: download sample
Signature Formbook
File size:610'359 bytes
First seen:2025-02-11 17:11:31 UTC
Last seen:2025-02-12 13:28:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 890e522b31701e079a367b89393329e6 (25 x Formbook, 12 x AgentTesla, 8 x Loda)
ssdeep 12288:v6Wq4aaE6KwyF5L0Y2D1PqLeVoL0mFn5YBeAr1yMrW6boEy5WYawPgOTDi:tthEVaPqLeqL0a5IBrW6boH4qPgOi
TLSH T1F9D423DB7CE08821E92807B6BB230BC1C4F03970D6E5A72FB101525B9D6F1079A5FAD9
TrID 86.7% (.EXE) AutoIt3 compiled script executable (510622/80/67)
4.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
1.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
0.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
File icon (PE):PE icon
dhash icon b150b26869b2d471 (468 x Formbook, 101 x RedLineStealer, 94 x AgentTesla)
Reporter lowmal3
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
4
# of downloads :
467
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
REVISED PROFORMA INVOICE.exe
Verdict:
No threats detected
Analysis date:
2025-02-11 17:12:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Сreating synchronization primitives
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
autoit masquerade microsoft_visual_cc obfuscated overlay packed packed packed packer_detected upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1612324 Sample: REVISED PROFORMA INVOICE.exe Startdate: 11/02/2025 Architecture: WINDOWS Score: 100 28 www.themutznuts.xyz 2->28 30 www.zkderby.xyz 2->30 32 5 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Antivirus detection for URL or domain 2->44 46 Antivirus / Scanner detection for submitted sample 2->46 50 6 other signatures 2->50 10 REVISED PROFORMA INVOICE.exe 4 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Writes to foreign memory regions 10->62 64 Maps a DLL or memory area into another process 10->64 13 svchost.exe 10->13         started        process6 signatures7 66 Maps a DLL or memory area into another process 13->66 16 s3r41s0aQnxZImi.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 tzutil.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 s3r41s0aQnxZImi.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 themutznuts.xyz 84.32.84.32, 49838, 80 NTT-LT-ASLT Lithuania 22->34 36 natroredirect.natrocdn.com 85.159.66.93, 50012, 80 CIZGITR Turkey 22->36 38 www.gnolls.xyz 13.248.169.48, 49937, 49953, 49972 AMAZON-02US United States 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14
Threat name:
Win32.Trojan.Autoitinject
Status:
Malicious
First seen:
2025-02-11 17:12:17 UTC
File Type:
PE (Exe)
Extracted files:
56
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
admintool_powerrun formbook
Similar samples:
Result
Malware family:
n/a
Score:
  8/10
Tags:
adware discovery persistence privilege_escalation stealer upx
Behaviour
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
AutoIT Executable
Drops file in System32 directory
Suspicious use of SetThreadContext
UPX packed file
Checks installed software on the system
Installs/modifies Browser Helper Object
Event Triggered Execution: Component Object Model Hijacking
Executes dropped EXE
Boot or Logon Autostart Execution: Active Setup
Downloads MZ/PE file
Verdict:
Malicious
Tags:
trojan
YARA:
MAL_Malware_Imphash_Mar23_1
Unpacked files
SH256 hash:
e3d098c75b7d9ac2bcc0a77d244775131d0993d46145621e4b1dd40f2023fded
MD5 hash:
85300cb7688b8494633557f6b18f3c7b
SHA1 hash:
64ec5f4c19f5eb03cc11a3119e5ea84ffd963134
SH256 hash:
c056a5309ac5f477cdf46aba2116ccb5d64d3c23ca6417bf2a3f51fb000699c5
MD5 hash:
7704e0d49c3d414b57f96ea7c8c18276
SHA1 hash:
9af8d63baa860b7f0a0624b8eb38b486b704ad23
Detections:
AutoIT_Compiled
SH256 hash:
9940fba814b5037e4fb9af9e6805a27c86142ce318f096b8a013569b14217931
MD5 hash:
a787feac8fbb224ac06b9a846dd64ae7
SHA1 hash:
84acf250a9d49c98fff40c939174b2e859e5b13b
SH256 hash:
c5be26e0e30aeb316d61806ad52493b06883b7766d21c4c82eaf922cea0cdef0
MD5 hash:
a0aecf68a856dca85da57c1c38849855
SHA1 hash:
810a32f6b11ffda92a6a4d2c2100894d177c8968
SH256 hash:
82d0d29abbff19190278af9c5c9dd8b11ad239b9006cc4e4008e3a0745f13d1a
MD5 hash:
d298a0964cb4638f208eff8dc2da49d0
SHA1 hash:
03b710f20e8b60e15c0864536813dcbb3f60923a
Detections:
win_formbook_g0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe e3d098c75b7d9ac2bcc0a77d244775131d0993d46145621e4b1dd40f2023fded

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::GetAce
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments