MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee87f646871da3ccd9efda67ac9d782701d42ad639db7f94ef70ff1ae958baf8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 20 File information Comments

SHA256 hash: ee87f646871da3ccd9efda67ac9d782701d42ad639db7f94ef70ff1ae958baf8
SHA3-384 hash: f0c7d1ab8ea8f7497be4270d2c6a677b798feb996ad6aee9150f23ed91b918a4cc30b2ca5d8822937f021d2c3f834809
SHA1 hash: 5929f761b423c2751133d93c0069d2846d214fd5
MD5 hash: 35243bfed15d5a0eb988ba62b3f41ae5
humanhash: connecticut-uncle-cardinal-michigan
File name:RFQ No. 64002292TMS.pdf.exe
Download: download sample
Signature Formbook
File size:379'613 bytes
First seen:2023-11-09 13:58:11 UTC
Last seen:2023-11-09 18:07:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b76363e9cb88bf9390860da8e50999d2 (464 x Formbook, 184 x AgentTesla, 122 x SnakeKeylogger)
ssdeep 6144:58LxBX6kkMNZoJG90tt9yVBaZp0oufjak7kzBzG+DI4vhGSZbo/d9mXIS43BXCP+:vMzT3VI5TjlzrcYhGSpoViIb3ByPStgo
Threatray 326 similar samples on MalwareBazaar
TLSH T1B7841242B2D244DBEE3B1DB2541FCD3164A20E6CD5A9920FE3C97B3F829174105AF7A6
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon d6e6660ed0f8f282 (1 x Formbook)
Reporter malwarelabnet
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
331
Origin country :
CA CA
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Launching the process to change network settings
Сreating synchronization primitives
Launching cmd.exe command interpreter
Setting browser functions hooks
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Unauthorized injection to a browser process
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control installer lolbin masquerade overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1339757 Sample: RFQ_No._64002292TMS.pdf.exe Startdate: 09/11/2023 Architecture: WINDOWS Score: 100 48 www.vinteligencia.com 2->48 50 www.vaskaworldairways.com 2->50 52 12 other IPs or domains 2->52 68 Snort IDS alert for network traffic 2->68 70 Multi AV Scanner detection for domain / URL 2->70 72 Found malware configuration 2->72 74 9 other signatures 2->74 12 RFQ_No._64002292TMS.pdf.exe 17 2->12         started        signatures3 process4 file5 44 C:\Users\user\AppData\Local\Temp\ebgar.exe, PE32 12->44 dropped 15 ebgar.exe 1 2 12->15         started        process6 file7 46 C:\Users\user\AppData\...\rbwgpluqaie.exe, PE32 15->46 dropped 60 Multi AV Scanner detection for dropped file 15->60 62 Machine Learning detection for dropped file 15->62 64 Maps a DLL or memory area into another process 15->64 66 Tries to detect virtualization through RDTSC time measurements 15->66 19 ebgar.exe 15->19         started        signatures8 process9 signatures10 76 Modifies the context of a thread in another process (thread injection) 19->76 78 Maps a DLL or memory area into another process 19->78 80 Sample uses process hollowing technique 19->80 82 Queues an APC in another process (thread injection) 19->82 22 explorer.exe 11 2 19->22 injected process11 dnsIp12 54 sarthaksrishticreation.com 119.18.49.69, 49742, 80 PUBLIC-DOMAIN-REGISTRYUS India 22->54 56 gk84.com 107.148.223.82, 49741, 80 PEGTECHINCUS United States 22->56 58 8 other IPs or domains 22->58 90 System process connects to network (likely due to code injection or exploit) 22->90 26 rbwgpluqaie.exe 22->26         started        29 svchost.exe 12 22->29         started        31 rbwgpluqaie.exe 22->31         started        33 2 other processes 22->33 signatures13 process14 signatures15 92 Multi AV Scanner detection for dropped file 26->92 94 Machine Learning detection for dropped file 26->94 96 Maps a DLL or memory area into another process 26->96 35 rbwgpluqaie.exe 26->35         started        98 System process connects to network (likely due to code injection or exploit) 29->98 100 Modifies the context of a thread in another process (thread injection) 29->100 102 Tries to detect virtualization through RDTSC time measurements 29->102 38 cmd.exe 1 29->38         started        40 rbwgpluqaie.exe 31->40         started        process16 signatures17 84 Modifies the context of a thread in another process (thread injection) 35->84 86 Maps a DLL or memory area into another process 35->86 88 Sample uses process hollowing technique 35->88 42 conhost.exe 38->42         started        process18
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2023-11-09 09:33:46 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
28 of 38 (73.68%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:sy22 persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Formbook payload
Formbook
Unpacked files
SH256 hash:
24fe9517e8701825def1d4094e92edbf9eaa76f22ef708f6e74b081ad1483f9a
MD5 hash:
fc5df6126d3f7c266dfa3ae743a9848e
SHA1 hash:
08b1e6c48eb2149ffb272ed476314135dca8ff09
Detections:
FormBook win_formbook_w0 win_formbook_auto win_formbook_g0
Parent samples :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 hash:
89c25531bba94f4d074fc2dd348a3358103b4689ff0201fe7662ada404d0c26a
MD5 hash:
d96b14bc6ea3b0764c4602adc2bea92e
SHA1 hash:
118ed2dd686cf891dcc5a878b3e673c13ddebd56
SH256 hash:
ee87f646871da3ccd9efda67ac9d782701d42ad639db7f94ef70ff1ae958baf8
MD5 hash:
35243bfed15d5a0eb988ba62b3f41ae5
SHA1 hash:
5929f761b423c2751133d93c0069d2846d214fd5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__GlobalFlags
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Formbook
Author:kevoreilly
Description:Formbook Payload
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Windows_Trojan_Formbook
Author:@malgamy12
Rule name:Windows_Trojan_Formbook_1112e116
Author:Elastic Security
Rule name:win_formbook_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.formbook.
Rule name:win_formbook_w0
Author:@malgamy12

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments