MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ea5d0e4ab31210201c16f170baab91b8c9bd9feee135e29ce4d033e4506bb000. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | ea5d0e4ab31210201c16f170baab91b8c9bd9feee135e29ce4d033e4506bb000 |
|---|---|
| SHA3-384 hash: | 7b4bb5571bf91f44ec19d2874ca4ac72b8b2520eb8ee9a4b7c3ccb864553c3ed7a1f325929d912f6d1369a4d9ed7f750 |
| SHA1 hash: | 7564dd4eb736c91be67d36c151464b6bf8c9ee73 |
| MD5 hash: | fce0950ab93b6bac5b73213236e221bd |
| humanhash: | illinois-princess-pip-item |
| File name: | CHQUE COPY.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'203'712 bytes |
| First seen: | 2025-05-07 02:06:02 UTC |
| Last seen: | 2025-05-12 08:42:15 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger) |
| ssdeep | 24576:2tb20pkaCqT5TBWgNQ7aZG927Vt/FTvQ7rrmVorppVk6A:jVg5tQ7aZG92pttDUr3S5 |
| TLSH | T17B45CF1363DE8361C3725273BA65B701AEBF782506B1F96B2FD4093DB920122525EB73 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
ecfcb1b1ffd98d7fc34996aadca709e571267386b4e95ef68ca96bf516cb17d0
0430a90c31aec5b1dc8250061bad8a72854e2edee80c2999f1ac4dab32c22c55
dc63e07cb6e12c12a56e70ff30c621337dfa43ab35d2807545573b5f5f44acbf
2f23dee62a1adce20c8fd77d668c5e2918685fae4a2e4b9561c9fbb7295bdc89
41795f508d0e2fc4e8fe6777a901133f8dee296a3ac4b0a139cef023b6a7ae10
5d614fa1807c2ae2cc2e29a00027213a6294e8258609d06ccf8e8e40512e9a46
f20f04adac1ffca30f941821769e4a8dbc0b882bda126ca86836c8fae187f9c4
eea69c259ea0ce8edc4a4fdb3dafd336a333435c1608bc45cdc48d87854ef6d9
078dbed6d7330ddd5e69ae308e8e8225c57164b4ca050cbca9804bbc97809933
318dcbb1b987e3159ac9b0b39363db5147af3ba45265878e9faee9582020785b
ea5d0e4ab31210201c16f170baab91b8c9bd9feee135e29ce4d033e4506bb000
ff104412e4610cd4f1295b738fae998277d82ed6daef3c526e883c1ce8a806e0
88f70255b375b99ff3a02d942c83f520e509d2e949646d99585a406de15e2293
978fa4742d2cb147265a502d12dec4b3663ca375dae526eb5e0a3edf723226c4
079877e37e8a515e9ecdd4445bbd4afba3ecccada4e612a3df7d81a3fa326209
160096756f8da7a4062e730f4f7be5cb4c254a55b6e68332104707209c078781
06ac36befe640325c35db775f1628e54299498f9699bd4e0bf1b0a1b1db3890c
ebdba069da16d21be030838146d56b6321472bf6308ac56ee66425473ac23e4d
26d4a6266fb482a80a40807f79118e7e0ce2c2ffe2e7b290460baa64dcd991f5
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | YahLover |
|---|---|
| Author: | Kevin Falcoz |
| Description: | YahLover |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.