MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f50e3ae7811af883e0f89737855c3d92cd1588efb521fe5808a170c220c1c647. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: f50e3ae7811af883e0f89737855c3d92cd1588efb521fe5808a170c220c1c647
SHA3-384 hash: 3654d9053e4fae5c3362987a04083b388fbbc0058f84afd42c732b244c19b33c35220bf4144e3605b402a66353d98e44
SHA1 hash: 8f7ffe21b9473d3f618db091ebf45998bbe6d79e
MD5 hash: 3d12dbca1a4952deb5ac59df6fb0ee2b
humanhash: single-solar-mississippi-lithium
File name:3d12dbca1a4952deb5ac59df6fb0ee2b.exe
Download: download sample
Signature Formbook
File size:897'024 bytes
First seen:2023-11-12 07:43:24 UTC
Last seen:2023-11-12 09:27:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:7is/DQHfUqPrvL35WLjuKgWlN1dbLTRjc5FkfdTcfOE:7qnrlWvuKg4VH4kfBcm
TLSH T10815487A12974607D8293175C8C3D2F32AFB9D207061D1C79AD76F6FBC450BBA61228B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 081a252525252608 (2 x SnakeKeylogger, 2 x Formbook, 1 x Loki)
Reporter abuse_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
304
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Restart of the analyzed sample
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found malware configuration
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1341256 Sample: anRD4ViHip.exe Startdate: 12/11/2023 Architecture: WINDOWS Score: 100 30 www.waygirl.site 2->30 32 www.rnfzhnndrhlh.top 2->32 34 17 other IPs or domains 2->34 44 Snort IDS alert for network traffic 2->44 46 Multi AV Scanner detection for domain / URL 2->46 48 Found malware configuration 2->48 52 11 other signatures 2->52 10 anRD4ViHip.exe 3 2->10         started        signatures3 50 Tries to resolve many domain names, but no domain seems valid 32->50 process4 signatures5 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->64 13 anRD4ViHip.exe 10->13         started        16 anRD4ViHip.exe 10->16         started        process6 signatures7 66 Maps a DLL or memory area into another process 13->66 68 Sample uses process hollowing technique 13->68 70 Queues an APC in another process (thread injection) 13->70 18 EaWupDiXUWLcXQIBbQbxTpBgGNgGJq.exe 13->18 injected process8 signatures9 42 Injects code into the Windows Explorer (explorer.exe) 18->42 21 explorer.exe 13 18->21         started        process10 signatures11 54 Tries to steal Mail credentials (via file / registry access) 21->54 56 Tries to harvest and steal browser information (history, passwords, etc) 21->56 58 Writes to foreign memory regions 21->58 60 3 other signatures 21->60 24 explorer.exe 9 1 21->24 injected 28 firefox.exe 21->28         started        process12 dnsIp13 36 byoganaples.com 50.87.253.242, 49716, 49717, 49718 UNIFIEDLAYER-AS-1US United States 24->36 38 catalogo.chat 177.154.191.148, 49720, 49721, 49722 IDC19-WDISOLUCOESEMTECINFORMACAOLTDABR Brazil 24->38 40 3 other IPs or domains 24->40 62 System process connects to network (likely due to code injection or exploit) 24->62 signatures14
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2022-10-18 13:16:25 UTC
File Type:
PE (.Net Exe)
Extracted files:
19
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
Score:
  10/10
Tags:
family:formbook family:zgrat campaign:re2t rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Detect ZGRat V1
Formbook
ZGRat
Unpacked files
SH256 hash:
991d2090a8d8a9b3c1f284c2ca3ccedaa6087315962ea9c4a8957b192ba896a3
MD5 hash:
21a73d87cd28d35f2a6047a0ddd6ed31
SHA1 hash:
04646cfa7d89439cccad31db55dd44585e202faa
Detections:
XLoader win_formbook_w0 win_formbook_auto win_formbook_g0
SH256 hash:
c735826a04f9362b803d4192e42b5f9db0800fa6b6e9c5e6b36c0e480aa7865a
MD5 hash:
445e8172051a512fedd871883a689a33
SHA1 hash:
ef3039b884792cbba1b8ac505fd5332f8d399753
SH256 hash:
fc2cc27aa025278396cb0d29283bdbf2f37e0c39573cdd7ccd1221161d327ca0
MD5 hash:
76e812140cc05d5cbc7a708fbed2faf8
SHA1 hash:
fb3749f9bccb9de2be4a6e8810d717e0bc63c8d8
SH256 hash:
e1802abf05195c31725e65ccbebbdaf1f8485b6c292825632bc151123d89b7f3
MD5 hash:
f0823a2edf59961a276b71d99fc1d7ca
SHA1 hash:
87c88e1780a440063f31d5ebd3399f2565264bff
SH256 hash:
23fc9392886cfb64b1b650cff6c023b1c747b68e42ff44c247f7445fdbc0b574
MD5 hash:
420d5d71263b708ed08b0a058e97396a
SHA1 hash:
2f520035fccd527f76ab17443af704ac4663be57
SH256 hash:
e20ec8f3c957bcb6a194ef688bae8af2015cfffb20e7baf8b2114d7b70ade4ee
MD5 hash:
35cb29046968faca7f3f3b4463449b6c
SHA1 hash:
088c8c30ec1bece0a4b5bbfe3982b073f8b95598
SH256 hash:
f50e3ae7811af883e0f89737855c3d92cd1588efb521fe5808a170c220c1c647
MD5 hash:
3d12dbca1a4952deb5ac59df6fb0ee2b
SHA1 hash:
8f7ffe21b9473d3f618db091ebf45998bbe6d79e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments