MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 04192a8beaa2f78a1c4ab5764134930e49fe58b202f7ea99a2421809a12acee2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 19
| SHA256 hash: | 04192a8beaa2f78a1c4ab5764134930e49fe58b202f7ea99a2421809a12acee2 |
|---|---|
| SHA3-384 hash: | e17bfe715ee4b9ff254c209cb39df9767f386db95f557fd7b4ccd1fe3509c224aa6d7588df273c386d23891eb495ce18 |
| SHA1 hash: | bde843908783ea9da392e73fa0c447ea2c250fdf |
| MD5 hash: | 5d86882d965a3d1e6e08cc2de6ef50d6 |
| humanhash: | michigan-louisiana-tennessee-green |
| File name: | Shipping documents.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 730'624 bytes |
| First seen: | 2025-09-12 04:57:43 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 21371b611d91188d602926b15db6bd48 (60 x Formbook, 23 x AgentTesla, 20 x RemcosRAT) |
| ssdeep | 12288:Nz7hU5I5yuNHIgzSFKxWltRohBfSTso93U9ATwFJM/tbe031J9p6tDjap0IgDQ:Nf+iN57Gtene3Wd+t60lJ9paDjW0lk |
| Threatray | 1'063 similar samples on MalwareBazaar |
| TLSH | T1F9F42345A9C16EA1C25073308436CD614A797D30DE26767F875AFA3B78703C3BA7246E |
| TrID | 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 7.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.9% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | dgaagas |
|---|---|
| Author: | Harshit |
| Description: | Uses certutil.exe to download a file named test.txt |
| Rule name: | Formbook |
|---|---|
| Author: | kevoreilly |
| Description: | Formbook Payload |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.