MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f97fe419a71f007b3c3cb39004b75dcabecef6361923f9922c67e781a2f7f61d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: f97fe419a71f007b3c3cb39004b75dcabecef6361923f9922c67e781a2f7f61d
SHA3-384 hash: ebfd9b95ca6470d92058026a0fd83421dcc02527a69187f58f395251879bd8bcda1ab96259fa80de7a6e409beed5ccff
SHA1 hash: c153d36f4684450e72889a0ba69c4ff11289fd3f
MD5 hash: 77193b2b08b735aa99fa84edffc8fb48
humanhash: red-april-triple-moon
File name:DHL Notification_pdf.exe
Download: download sample
Signature Formbook
File size:913'408 bytes
First seen:2022-10-13 11:41:49 UTC
Last seen:2022-10-13 12:23:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:8CRjG2s/O7YAcu3I7fSwK0fr3WkCPT7PKc5EglFzDuUUylB:1dp3ifSl0jpkuOJPD9lB
TLSH T13A155B7A21924506E4293275C4D3D2F32AFBAD607061D2CB9AD76F6FBC411BF9213386
TrID 61.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.0% (.SCR) Windows screen saver (13101/52/3)
8.8% (.EXE) Win64 Executable (generic) (10523/12/4)
5.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:DHL exe FormBook

Intelligence


File Origin
# of uploads :
2
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 722620 Sample: DHL Notification_pdf.exe Startdate: 13/10/2022 Architecture: WINDOWS Score: 100 35 Malicious sample detected (through community Yara rule) 2->35 37 Yara detected AntiVM3 2->37 39 Yara detected FormBook 2->39 41 7 other signatures 2->41 10 DHL Notification_pdf.exe 3 2->10         started        process3 file4 27 C:\Users\...\DHL Notification_pdf.exe.log, ASCII 10->27 dropped 13 DHL Notification_pdf.exe 10->13         started        process5 signatures6 49 Modifies the context of a thread in another process (thread injection) 13->49 51 Maps a DLL or memory area into another process 13->51 53 Sample uses process hollowing technique 13->53 55 Queues an APC in another process (thread injection) 13->55 16 explorer.exe 13->16 injected process7 dnsIp8 29 www.waltherchen.xyz 188.114.97.3, 49702, 80 CLOUDFLARENETUS European Union 16->29 31 System process connects to network (likely due to code injection or exploit) 16->31 33 Performs DNS queries to domains with low reputation 16->33 20 chkdsk.exe 16->20         started        signatures9 process10 signatures11 43 Modifies the context of a thread in another process (thread injection) 20->43 45 Maps a DLL or memory area into another process 20->45 47 Tries to detect virtualization through RDTSC time measurements 20->47 23 cmd.exe 1 20->23         started        process12 process13 25 conhost.exe 23->25         started       
Threat name:
ByteCode-MSIL.Trojan.Leonem
Status:
Malicious
First seen:
2022-10-13 09:09:50 UTC
File Type:
PE (.Net Exe)
Extracted files:
26
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:g28p rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
12971201b0c68b9106e80e12682fb6a5f76b2c848a50db6a2a0e4c0aa193753a
MD5 hash:
5ae9f6cee551cf8f9230eb5e81ee7a25
SHA1 hash:
8d2fa026eb3130888bb8279255db4c49a691bf52
Detections:
FormBook win_formbook_auto win_formbook_g0
Parent samples :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 hash:
6373359e13d6334044f4a3acf87788107b384afc69c2651a14566814ffdc96cb
MD5 hash:
e2316320c689967085ce3a6044660ff2
SHA1 hash:
e6f37e24827a3cd91f2a5bf2fa1762c5689f9580
SH256 hash:
af7ac1171b44c9a949ad80bfaf05095048d0b74cfb527f66479e22f47d340110
MD5 hash:
f696dc0e00cb8f70799ac3fcaa5f9f6a
SHA1 hash:
cde2283de5b89639ea52f6388feef8f77efc63ce
SH256 hash:
07814742e7b86c16736dd1c1f2316b7d1729b5d45ebd40f9c00058009331a445
MD5 hash:
a9493a61e62aea727a862dc8e0a12e04
SHA1 hash:
6114e97c8229076e4fbc9fe6d093f71cafaf3748
SH256 hash:
edadc813f4440ada276da601d8f31780e5e138b8ee392e3f49a509322a1fb51e
MD5 hash:
574597554c69083c1af2b742a97a92b6
SHA1 hash:
043eea660b8650c5a0042f842fd8db3516d37a2c
SH256 hash:
f97fe419a71f007b3c3cb39004b75dcabecef6361923f9922c67e781a2f7f61d
MD5 hash:
77193b2b08b735aa99fa84edffc8fb48
SHA1 hash:
c153d36f4684450e72889a0ba69c4ff11289fd3f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments