MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 086a8fb7b92306c495fc562bff32642b856edfc1077ed7c00956ae59363a0fb1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 086a8fb7b92306c495fc562bff32642b856edfc1077ed7c00956ae59363a0fb1
SHA3-384 hash: b109bc07b309cf68e3bd960efbe64993172dd3ecd4ede6b6337d375feef54bd555b347d0f74c85e6a1e107a0bbdf2ec2
SHA1 hash: d6ac17820772c4d84b664b76f2d30efd90d08465
MD5 hash: 3eb1d914ab6035e45e228af6a63cb352
humanhash: alanine-music-nine-bravo
File name:invoice.exe
Download: download sample
Signature Formbook
File size:1'092'608 bytes
First seen:2026-02-04 12:27:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'754 x AgentTesla, 19'664 x Formbook, 12'252 x SnakeKeylogger)
ssdeep 24576:w17ddx92PqVzY6bqqsKUaxNWgGdMWzTYy3XUVXO6wZWVc5n:wxjG2sKUaegGdMyTNk9O6iW6
TLSH T10E3512426229DA63C4AA47F509B1E33107B95D9FEC61C3034FEE9DEB79113166E093A3
TrID 35.4% (.EXE) Win64 Executable (generic) (10522/11/4)
22.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.1% (.EXE) Win32 Executable (generic) (4504/4/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter threatcat_ch
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
119
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
_086a8fb7b92306c495fc562bff32642b856edfc1077ed7c00956ae59363a0fb1.exe
Verdict:
Suspicious activity
Analysis date:
2026-02-04 12:29:57 UTC
Tags:
auto-startup

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
81.4%
Tags:
autorun micro virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
krypt masquerade obfuscated packed vbnet
Result
Gathering data
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Bypasses PowerShell execution policy
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Writes to foreign memory regions
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1863232 Sample: invoice.exe Startdate: 04/02/2026 Architecture: WINDOWS Score: 96 36 shed.dual-low.part-0012.t-0009.t-msedge.net 2->36 38 part-0012.t-0009.t-msedge.net 2->38 40 2 other IPs or domains 2->40 54 Multi AV Scanner detection for submitted file 2->54 56 Yara detected AntiVM3 2->56 58 Suspicious powershell command line found 2->58 60 4 other signatures 2->60 9 invoice.exe 7 2->9         started        14 powershell.exe 15 2->14         started        signatures3 process4 dnsIp5 44 192.168.2.4, 138, 443, 49710 unknown unknown 9->44 30 C:\Users\user\AppData\Roaming\uRWafz.exe, PE32 9->30 dropped 32 C:\Users\user\...\uRWafz.exe:Zone.Identifier, ASCII 9->32 dropped 34 C:\Users\user\AppData\...\invoice.exe.log, ASCII 9->34 dropped 62 Writes to foreign memory regions 9->62 64 Allocates memory in foreign processes 9->64 66 Injects a PE file into a foreign processes 9->66 16 RegSvcs.exe 9->16         started        18 uRWafz.exe 5 14->18         started        21 conhost.exe 1 14->21         started        file6 signatures7 process8 signatures9 23 WerFault.exe 22 16 16->23         started        46 Multi AV Scanner detection for dropped file 18->46 48 Writes to foreign memory regions 18->48 50 Allocates memory in foreign processes 18->50 52 Injects a PE file into a foreign processes 18->52 26 RegSvcs.exe 18->26         started        process10 dnsIp11 42 part-0012.t-0009.t-msedge.net 13.107.246.40, 443, 49739, 49740 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 23->42 28 WerFault.exe 1 21 26->28         started        process12
Gathering data
Threat name:
Win32.Trojan.Xworm
Status:
Malicious
First seen:
2026-02-04 10:50:18 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
14 of 36 (38.89%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Drops startup file
Formbook payload
Formbook
Formbook family
Unpacked files
SH256 hash:
086a8fb7b92306c495fc562bff32642b856edfc1077ed7c00956ae59363a0fb1
MD5 hash:
3eb1d914ab6035e45e228af6a63cb352
SHA1 hash:
d6ac17820772c4d84b664b76f2d30efd90d08465
SH256 hash:
fcbfdf9c1b2906556804c0750585aec00d49cad1c3c214168ab402c39cc99dfe
MD5 hash:
c0b9f794e74f11a3c6070317535e8602
SHA1 hash:
7d632abf71a5a91fd4522664c482fd2c1f832659
SH256 hash:
83a59f56894b213676f85a9b1a91597a7c30cd2bffc49e27aa5fae79dab2a486
MD5 hash:
9d98207e75fddd904f88e347c7e1ed54
SHA1 hash:
d9c192945b1b5fe6e92aa8582f092ba542a8a982
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
SH256 hash:
1610db4a0301e6d64106616b6c5f71eefc28d08df8e7a7f82185d9417faf9e0f
MD5 hash:
869afd4f36171c8cd31c6a54b9e10ec9
SHA1 hash:
bfd46b23d44c2c2bcf7a1af4de11dfadae269343
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 086a8fb7b92306c495fc562bff32642b856edfc1077ed7c00956ae59363a0fb1

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments