MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ffdf5023253f85c17296dbb3a31d959b54b67c6db569b4b0f3a69eeeca76e112. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: ffdf5023253f85c17296dbb3a31d959b54b67c6db569b4b0f3a69eeeca76e112
SHA3-384 hash: 2e72d1786562efffc450d107e585c912c846eb48872c8f4ecc45ab4302fba00fdfca07382c0033c07a36f048906dd75e
SHA1 hash: 749ecb4b9a1f775003b9037f6ebee88df8cd2c31
MD5 hash: f18e70cad17771781b755ba55846ec36
humanhash: august-eighteen-comet-jig
File name:BATCH MCC220601.exe
Download: download sample
Signature Formbook
File size:900'096 bytes
First seen:2022-10-28 22:17:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:9Wh702iNp6Rdy4vnVNGEu9zLmqzjCFGwwExvOCmIh5/C8WQGJu9TRrDV530:11SdFVBCzjCFfJBrr/COKu9tnV5
TLSH T1AF15125AF623E9B8DA6D037928344C022F79D9127DCDD66C698237AE0837A03565FCC7
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter GovCERT_CH
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
366
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
BATCH MCC220601.exe
Verdict:
Malicious activity
Analysis date:
2022-10-28 22:21:10 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
formbook packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-10-27 20:44:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
50
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook campaign:ss63 rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Formbook payload
Formbook
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
248a7c4997aacb14ca032daf9668636839f921d0a3403f09a3b0ccfdc948cbf1
MD5 hash:
a7952169b04a2c6a39661aad59e79dcf
SHA1 hash:
88722f1a32c913307c0c6385b04478a79fabd12b
SH256 hash:
cfc16a2dbb933b1b85807d48966e9301b9fc34f4c44e7357713ca88b54bf4ab4
MD5 hash:
aabd0bdc81026ade6c57383f21d5c227
SHA1 hash:
4b26936bb8c03be6d7963184215a5ab594ecb765
SH256 hash:
12fe28644dcc7afd6094aa65945c7d75443a543a54c14fd7e2a9dee376c6b751
MD5 hash:
bc684955b0952fa11d3ea854f41f6748
SHA1 hash:
186226fb8257817e6d60af91d23b40044a154291
SH256 hash:
e28fff3f093a0942383707e8c1c63bd54fd915c12b30af8f9fa7e75afce060f7
MD5 hash:
42164816aa0c4cd9f829707bce6cdd5b
SHA1 hash:
13bf0600eb3549cc9c5579e2e3f9f66ccde00261
SH256 hash:
ffdf5023253f85c17296dbb3a31d959b54b67c6db569b4b0f3a69eeeca76e112
MD5 hash:
f18e70cad17771781b755ba55846ec36
SHA1 hash:
749ecb4b9a1f775003b9037f6ebee88df8cd2c31
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe ffdf5023253f85c17296dbb3a31d959b54b67c6db569b4b0f3a69eeeca76e112

(this sample)

  
Dropped by
formbook
  
Delivery method
Distributed via e-mail attachment

Comments