MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1d227c29702a16bc418b92aebbfbcf49c0584c25488c0257b4c8276bbdeb68c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 1d227c29702a16bc418b92aebbfbcf49c0584c25488c0257b4c8276bbdeb68c5 |
|---|---|
| SHA3-384 hash: | 5f5ef24de908be72b2f1e160c47a371f7863b55e8352e21ee0053cd4861d60ce20c45a716f1a783561c0c12f41d96071 |
| SHA1 hash: | d56228d6148cef672656628c9782692b21c662aa |
| MD5 hash: | 27c38b24ca0e50d43dda69174ba5df51 |
| humanhash: | nevada-december-hydrogen-snake |
| File name: | KUZUOGLU ORDER N. F-1676.25.pdf.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'293'824 bytes |
| First seen: | 2025-06-24 15:20:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0b768923437678ce375719e30b21693e (143 x Formbook, 25 x MassLogger, 22 x SnakeKeylogger) |
| ssdeep | 24576:u5EmXFtKaL4/oFe5T9yyXYfP1ijXdau+2zdHI/8aiYWhYp:uPVt/LZeJbInQRauddHm5W |
| Threatray | 183 similar samples on MalwareBazaar |
| TLSH | T13055CF027381C062FFAB92734F56F6115BBC79660123A62F13981DB9BE701B1563E7A3 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| dhash icon | aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.