MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 160096756f8da7a4062e730f4f7be5cb4c254a55b6e68332104707209c078781. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 160096756f8da7a4062e730f4f7be5cb4c254a55b6e68332104707209c078781 |
|---|---|
| SHA3-384 hash: | 5e4e17ff3b50e8aefa8b632164c048799e66025de69ac8c789927acb48e347b898c0fbe546964dd43ea2fe0ecfbf25d2 |
| SHA1 hash: | e3c8a8eb6adceccc3cf7bb8062773a9e75c8eee7 |
| MD5 hash: | f48b2703c89561f717165f787cdea51f |
| humanhash: | berlin-foxtrot-nebraska-victor |
| File name: | CHQUE COPY.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'292'288 bytes |
| First seen: | 2025-06-26 02:24:26 UTC |
| Last seen: | 2025-06-26 07:00:46 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0b768923437678ce375719e30b21693e (143 x Formbook, 25 x MassLogger, 22 x SnakeKeylogger) |
| ssdeep | 24576:W5EmXFtKaL4/oFe5T9yyXYfP1ijXda5KIlH8L0zFlY7d+MS7:WPVt/LZeJbInQRa5NlcL0z/Yb |
| Threatray | 25 similar samples on MalwareBazaar |
| TLSH | T1DA55CF0273C1D062FFAB92734B56F6115BBC79260123A62F13981DB9BE701B1563E7A3 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
ecfcb1b1ffd98d7fc34996aadca709e571267386b4e95ef68ca96bf516cb17d0
0430a90c31aec5b1dc8250061bad8a72854e2edee80c2999f1ac4dab32c22c55
dc63e07cb6e12c12a56e70ff30c621337dfa43ab35d2807545573b5f5f44acbf
2f23dee62a1adce20c8fd77d668c5e2918685fae4a2e4b9561c9fbb7295bdc89
41795f508d0e2fc4e8fe6777a901133f8dee296a3ac4b0a139cef023b6a7ae10
5d614fa1807c2ae2cc2e29a00027213a6294e8258609d06ccf8e8e40512e9a46
f20f04adac1ffca30f941821769e4a8dbc0b882bda126ca86836c8fae187f9c4
eea69c259ea0ce8edc4a4fdb3dafd336a333435c1608bc45cdc48d87854ef6d9
078dbed6d7330ddd5e69ae308e8e8225c57164b4ca050cbca9804bbc97809933
318dcbb1b987e3159ac9b0b39363db5147af3ba45265878e9faee9582020785b
ea5d0e4ab31210201c16f170baab91b8c9bd9feee135e29ce4d033e4506bb000
ff104412e4610cd4f1295b738fae998277d82ed6daef3c526e883c1ce8a806e0
88f70255b375b99ff3a02d942c83f520e509d2e949646d99585a406de15e2293
978fa4742d2cb147265a502d12dec4b3663ca375dae526eb5e0a3edf723226c4
079877e37e8a515e9ecdd4445bbd4afba3ecccada4e612a3df7d81a3fa326209
160096756f8da7a4062e730f4f7be5cb4c254a55b6e68332104707209c078781
06ac36befe640325c35db775f1628e54299498f9699bd4e0bf1b0a1b1db3890c
ebdba069da16d21be030838146d56b6321472bf6308ac56ee66425473ac23e4d
26d4a6266fb482a80a40807f79118e7e0ce2c2ffe2e7b290460baa64dcd991f5
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Formbook |
|---|---|
| Author: | kevoreilly |
| Description: | Formbook Payload |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.