MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f52ed6bc805585d9e81b15a327af3ecbccc67aac180dff55968b5133035ce74d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: f52ed6bc805585d9e81b15a327af3ecbccc67aac180dff55968b5133035ce74d
SHA3-384 hash: a180ba3070550bedfc247907a159f50771a98cc681bf8e9f971230931520cadcb848791c2776aaced8e4dabc7bfa8be5
SHA1 hash: 63adeab473d51d5b646e4c5159013b8bce13b985
MD5 hash: 26f39353ccf8794431815b8bb8961515
humanhash: east-east-india-mike
File name:FormPlayer.exe
Download: download sample
File size:2'344'448 bytes
First seen:2024-08-01 07:20:19 UTC
Last seen:2024-08-01 08:36:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 49152:GbyDiPevb0uowQbyVGy69zWYCFiWjN/v2y4D6ozfUZ3fdluI:GbyD9z0uxQGVGt1DFOn2Taf9
Threatray 44 similar samples on MalwareBazaar
TLSH T1BCB52301DBAD8EA1C0D439FA85430BCD43A4B70E343AC7EDAE493D09E929B571E766D4
TrID 35.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
28.3% (.EXE) Win32 EXE PECompact compressed (v2.x) (59069/9/14)
19.9% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
5.0% (.EXE) Win64 Executable (generic) (10523/12/4)
3.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon c8c49aa9acd6ea86 (3 x CobaltStrike, 1 x Arechclient2, 1 x BadRabbit)
Reporter JAMESWT_WT
Tags:exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
321
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FormPlayer.exe
Verdict:
Malicious activity
Analysis date:
2024-08-01 08:09:21 UTC
Tags:
evasion upx

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Discovery Generic Infostealer Network Other Static Stealth Malware
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Creating a window
Creating a service
Using the Windows Management Instrumentation requests
Changing a file
Moving a recently created file
Searching for synchronization primitives
Sending an HTTP GET request
Unauthorized injection to a recently created process
Enabling autorun for a service
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
lolbin packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Reads the Security eventlog
Reads the System eventlog
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1485880 Sample: FormPlayer.exe Startdate: 01/08/2024 Architecture: WINDOWS Score: 100 24 www.flash.cn.cdn.dnsv1.com 2->24 26 www.flash.cn 2->26 28 4 other IPs or domains 2->28 40 Antivirus / Scanner detection for submitted sample 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 .NET source code contains potential unpacker 2->44 46 2 other signatures 2->46 7 FormPlayer.exe 14 4 2->7         started        12 svchost.exe 1 1 2->12         started        signatures3 process4 dnsIp5 30 falshcm.oss-cn-hongkong.aliyuncs.com 47.79.64.190, 443, 49730 VODAFONE-TRANSIT-ASVodafoneNZLtdNZ United States 7->30 20 C:\Users\user\nep.exe, PE32+ 7->20 dropped 22 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 7->22 dropped 48 Drops PE files to the user root directory 7->48 14 nep.exe 16 2 7->14         started        18 setup.exe 243 7->18         started        32 127.0.0.1 unknown unknown 12->32 file6 signatures7 process8 dnsIp9 34 mstsc.l5.cm 47.76.188.34, 20088, 49733, 49746 VODAFONE-TRANSIT-ASVodafoneNZLtdNZ United States 14->34 36 api.ipify.org 172.67.74.152, 49736, 49747, 80 CLOUDFLARENETUS United States 14->36 50 Antivirus detection for dropped file 14->50 52 Multi AV Scanner detection for dropped file 14->52 54 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 14->54 58 5 other signatures 14->58 38 488928.ovslegodl.sched.ovscdns.com 43.152.29.72, 443, 49734 LILLY-ASUS Japan 18->38 56 Detected unpacking (changes PE section rights) 18->56 signatures10
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-06-17 05:35:13 UTC
File Type:
PE (.Net Exe)
Extracted files:
415
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
467f6766c0fe82abc9286b530d7fa455360c8c7f20a7f28461c54873e4e4de21
MD5 hash:
6be622c4fd3a217b3f45dcd0b1897ffe
SHA1 hash:
0d31265517b835028a81eaf4e16dd3b60d4bc874
Detections:
win_samsam_auto
SH256 hash:
94bf4afd3a77d76311159daa2f19643a7f7d1e2c4b37807651b328feeef34668
MD5 hash:
1115be7832a7fa6005cb06aa20cdbb5c
SHA1 hash:
d0cf4dcc15749f031b4f5631bd603daf3bae1696
SH256 hash:
4bf1f7ab15b8a636248aeaf26a9c51ab5478d075399632114334f0911caa18ba
MD5 hash:
628ca44a0da32146d416661d09a2f444
SHA1 hash:
bd6b90425785fddc251aa09db4656e63c19a558b
SH256 hash:
2fd2620e4eff83a2c7590ff6bd46b6b1657d4b567f1b7ebf392990ccf9b80828
MD5 hash:
7497dccc07365763b3ac314c11cefbec
SHA1 hash:
a548fef0cb02a3427af8cf492dc6a1b3ce8fc875
SH256 hash:
7a55e9246e66353d32c2214920e5976fc5ac77f94aa3824d12a9289362ea425d
MD5 hash:
e9bbfc471c310ebba367176108b35004
SHA1 hash:
a0498fb9a661cff500cfe415cadb7bc6d0f3edeb
SH256 hash:
f52ed6bc805585d9e81b15a327af3ecbccc67aac180dff55968b5133035ce74d
MD5 hash:
26f39353ccf8794431815b8bb8961515
SHA1 hash:
63adeab473d51d5b646e4c5159013b8bce13b985
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:PECompactv2xx
Author:malware-lu
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high

Comments