MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f3800a7223fa24b1df3efff490172e0b73afc2359303e2476247e070e4eb0911. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | f3800a7223fa24b1df3efff490172e0b73afc2359303e2476247e070e4eb0911 |
|---|---|
| SHA3-384 hash: | aaa8274402be4c07e3f8ea3c0bfdb7e9339e34a81262239f62fa65d7d6717e15891bca06180340a083d325712b6b1b49 |
| SHA1 hash: | 230b7232263789b3e43604770d923e2a66d3eb50 |
| MD5 hash: | e1bfe10f37183ae1803496a4e5d3b8e1 |
| humanhash: | five-fix-california-ohio |
| File name: | f3800a7223fa24b1df3efff490172e0b73afc2359303e2476247e070e4eb0911 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'325'056 bytes |
| First seen: | 2024-09-09 13:49:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 948cc502fe9226992dce9417f952fce3 (1'182 x CredentialFlusher, 446 x Formbook, 231 x AgentTesla) |
| ssdeep | 24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8ar7O55/JxphR4J4p91z:5TvC/MTQYxsWR7aPY5qJ4j |
| TLSH | T17F55BF0277818062FE9B92330B6AF631567D6D260133A51F13D83DBBBE711B1563E6A3 |
| TrID | 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 12.5% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.4% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | d4c4c4d8ccd4f0c4 (63 x Formbook, 23 x AgentTesla, 8 x RemcosRAT) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
# of uploads :
1
# of downloads :
432
Origin country :
HUVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f3800a7223fa24b1df3efff490172e0b73afc2359303e2476247e070e4eb0911
Verdict:
No threats detected
Analysis date:
2024-09-09 13:53:07 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Autoit
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Сreating synchronization primitives
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin microsoft_visual_cc packed shell32
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2024-09-06 09:11:48 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
n/a
Score:
5/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
734a38548eab4e0b6b99a5a8aa16a4b71136b0cf2414a66b01a926db10b6e299
MD5 hash:
622bfe79367a556c5ffa3393fa42d2b1
SHA1 hash:
996a706cbd697bd982e638328ae4ee38fa608b8b
Detections:
win_formbook_g0
win_formbook_w0
Parent samples :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 hash:
792254103360fd678bafae794625c9ef53ac7d841ce19ec9cdb9c03716a4ab51
MD5 hash:
c3494de803f51e274a74b28042b31f53
SHA1 hash:
e9e0e965a6cedc3840fd12cd71da18ada20d238e
SH256 hash:
f3800a7223fa24b1df3efff490172e0b73afc2359303e2476247e070e4eb0911
MD5 hash:
e1bfe10f37183ae1803496a4e5d3b8e1
SHA1 hash:
230b7232263789b3e43604770d923e2a66d3eb50
Detections:
AutoIT_Compiled
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::CopySid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::GetTokenInformation ADVAPI32.dll::GetAce |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoCreateInstanceEx ole32.dll::CoInitializeSecurity ole32.dll::CreateStreamOnHGlobal |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::mciSendStringW WINMM.dll::timeGetTime WINMM.dll::waveOutSetVolume |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAce ADVAPI32.dll::AdjustTokenPrivileges ADVAPI32.dll::CheckTokenMembership ADVAPI32.dll::DuplicateTokenEx ADVAPI32.dll::GetAclInformation ADVAPI32.dll::GetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW |
| WIN32_PROCESS_API | Can Create Process and Threads | ADVAPI32.dll::CreateProcessAsUserW KERNEL32.dll::CreateProcessW ADVAPI32.dll::CreateProcessWithLogonW KERNEL32.dll::OpenProcess ADVAPI32.dll::OpenProcessToken ADVAPI32.dll::OpenThreadToken |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::SetSystemPowerState KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateHardLinkW IPHLPAPI.DLL::IcmpCreateFile KERNEL32.dll::CreateFileW |
| WIN_BASE_USER_API | Retrieves Account Information | KERNEL32.dll::GetComputerNameW ADVAPI32.dll::GetUserNameW ADVAPI32.dll::LogonUserW ADVAPI32.dll::LookupPrivilegeValueW |
| WIN_NETWORK_API | Supports Windows Networking | MPR.dll::WNetAddConnection2W MPR.dll::WNetUseConnectionW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegConnectRegistryW ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::BlockInput USER32.dll::CloseDesktop USER32.dll::CreateMenu USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::FindWindowW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.