MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 edfca2e01a1d5e95bc4711d90d76195346104a87ad1ab8347d7e91d8be22b1ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: edfca2e01a1d5e95bc4711d90d76195346104a87ad1ab8347d7e91d8be22b1ca
SHA3-384 hash: 278f38dfd2c79a08a445c892c0db35ed21069082668daf42af217a01606cd52a150f2000c34464b36b8d24c62c025fa0
SHA1 hash: ccf9f7eff916b97921a231bd83994eb6e9a94dd3
MD5 hash: 2de5ac2e3b01a92b8c0b28207fe75521
humanhash: november-alanine-nuts-pasta
File name:DHL Consignment Details_pdf.exe
Download: download sample
Signature Formbook
File size:663'552 bytes
First seen:2023-11-28 08:09:52 UTC
Last seen:2023-11-28 09:18:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:PGCQmbCpisWjX+ZI1fcd0lF5S8CrFhtGi5d9PR10UBK:O8+kDHst1G4PwL
Threatray 20 similar samples on MalwareBazaar
TLSH T102E42352B1585167E8FB96F226B15001877F671A9296FBCF6E82B0ED8EE43C00316F53
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 68c4d2d2725a5252 (10 x Formbook, 8 x AgentTesla, 3 x SnakeKeylogger)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
299
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Launching a process
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus detection for URL or domain
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1349111 Sample: DHL_Consignment_Details_pdf.exe Startdate: 28/11/2023 Architecture: WINDOWS Score: 100 30 www.iengineeringmalls.com 2->30 32 www.zz23xw.top 2->32 34 9 other IPs or domains 2->34 42 Multi AV Scanner detection for domain / URL 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 48 6 other signatures 2->48 10 DHL_Consignment_Details_pdf.exe 3 2->10         started        signatures3 process4 signatures5 58 Injects a PE file into a foreign processes 10->58 13 DHL_Consignment_Details_pdf.exe 10->13         started        16 WMIADAP.exe 18 10 10->16         started        18 DHL_Consignment_Details_pdf.exe 10->18         started        process6 signatures7 60 Maps a DLL or memory area into another process 13->60 20 UKJjvCulzjfBMPKL.exe 13->20 injected process8 process9 22 iexpress.exe 13 20->22         started        signatures10 50 Tries to steal Mail credentials (via file / registry access) 22->50 52 Tries to harvest and steal browser information (history, passwords, etc) 22->52 54 Writes to foreign memory regions 22->54 56 3 other signatures 22->56 25 UKJjvCulzjfBMPKL.exe 22->25 injected 28 firefox.exe 22->28         started        process11 dnsIp12 36 www.esperomuzik.org 154.213.65.193, 49733, 49734, 49735 VPSQUANUS Seychelles 25->36 38 www.zz23xw.top 198.44.187.121, 49745, 49746, 49747 VPSQUANUS United States 25->38 40 8 other IPs or domains 25->40
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-11-28 02:33:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Unpacked files
SH256 hash:
d64c9796114f05fcdb886b9ec12794e2b5a9abdc7af43ffe4b188258b0c6247e
MD5 hash:
af68b5b2076e41f2661538c12ceb7ac9
SHA1 hash:
0e1d9e9972ccc9c9a441bccf0885995ccb2fc787
Detections:
win_formbook_w0 win_formbook_g0
SH256 hash:
0a351e21008b1210125bc55edc9838942ad40a8e64fd28dada7cfdbf728b7e6e
MD5 hash:
4818f50f932b66aecaf32630944c4717
SHA1 hash:
2a823c0d41a3e0feed74f31bbc0042473aed3a11
SH256 hash:
dc2a31ebcef7e1b02ef0b2237da0e126dfebaa6a6336f829c0194b89793e239b
MD5 hash:
3d9dd0ed4f6deb6ad320d84fa5a40542
SHA1 hash:
f2daf79f4bfd1118856e13e1487c99259415d39e
SH256 hash:
2a0290a662e89a81ed2d9c73e54a0aeba209fc36617f134cf0aaa74690db47db
MD5 hash:
4820945deb84d6bd26460e8a6ba0c622
SHA1 hash:
c519540ad21594fa45fcc2e6e15cfbea8b3449b9
SH256 hash:
baab8442672b0b6813f802b71d65bcd645d119c06a645498fc0079c5307c8bb3
MD5 hash:
3a5d02ee4c1b836087703555480ade6a
SHA1 hash:
24eafb865344b2c3fe10d26d1cf9f64d137edf16
SH256 hash:
04df8b1eb86d048cb399429b32f37becd5c263f7f1cb3575a837c49e18631aaa
MD5 hash:
267a50f6fbfefe4725d94ddd0a425f3b
SHA1 hash:
9342ae048f60b87e85f622d71dcd430a5f62fd38
SH256 hash:
08bfbe6991e362f663444124d742928181c93b529b1f60569f1f475cd4b7f9b7
MD5 hash:
634d70455c14af4ce387989db08c80ee
SHA1 hash:
83b0ed0789cf9025458b3ee67cbd1346d17f5c61
SH256 hash:
0d97339c8a7432ba8db2cfbbff3b6fb38727834c1dd837d80d3c376663442211
MD5 hash:
855921ad61da7190b45cd064519e638c
SHA1 hash:
7a947fcadc360c4b9435c7dfec0d36198314f526
SH256 hash:
b371e281fa7bdd2b0a9ab236323c0654df3c73e4f16a6b8eff4a48cc6534b414
MD5 hash:
902dc6b7b93376a55657f6cc7742d91a
SHA1 hash:
30bb0177a45807d97d49a75c585af7ca79be3d99
SH256 hash:
870885cd375062c80c2f41ebd5bcdf7ce14acbed768fd035d61c7a4f81fe2309
MD5 hash:
0486c0b84e5777b3bead1fc04deeb193
SHA1 hash:
12d04b7750a403a220ea489365b414691124512f
SH256 hash:
ef8c34fb2747194c7645a76df5462c1a043df630a8d9500b547c3c31b6f56d91
MD5 hash:
0dd1e229c9658085359c6aa512c33722
SHA1 hash:
08aca3eb3ac4943f7bdc73caf77ae0aa13df3b40
SH256 hash:
edfca2e01a1d5e95bc4711d90d76195346104a87ad1ab8347d7e91d8be22b1ca
MD5 hash:
2de5ac2e3b01a92b8c0b28207fe75521
SHA1 hash:
ccf9f7eff916b97921a231bd83994eb6e9a94dd3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe edfca2e01a1d5e95bc4711d90d76195346104a87ad1ab8347d7e91d8be22b1ca

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments