MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2dd253e781e494e124b22c3b4422b181bdf3eddfdc76e68cd464fc38f59775e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 13


Intelligence 13 IOCs YARA 10 File information Comments

SHA256 hash: 2dd253e781e494e124b22c3b4422b181bdf3eddfdc76e68cd464fc38f59775e7
SHA3-384 hash: b55dc6753a21719ccd0e140a54293917c219272212bf2a44c64ff951891f117cff6ec244704d1f2be36b8a5debbeab77
SHA1 hash: 09036790dd956540ac61c572e48a58c194a18e66
MD5 hash: 2ebd2389ea6ae3114b121378fa281eca
humanhash: hawaii-sweet-romeo-mars
File name:2dd253e781e494e124b22c3b4422b181bdf3eddfdc76e68cd464fc38f59775e7
Download: download sample
Signature Formbook
File size:731'136 bytes
First seen:2026-02-05 14:56:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 21371b611d91188d602926b15db6bd48 (77 x Formbook, 64 x AgentTesla, 32 x SnakeKeylogger)
ssdeep 12288:gz7hU5I5yuNHIgzSFKxWltRohBfSTso93U9CBsRzrPIFkoJyAmpD/SlOiMsO:gf+iN57Gtene3WDPG/molOZ
TLSH T1C7F423D299C2ACE6C1316330C436CD4186763972AC73312E972DE97E6878383D997B5D
TrID 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6)
38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.9% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon aae2f3e38383b629 (2'644 x Formbook, 1'203 x CredentialFlusher, 913 x AgentTesla)
Reporter adrian__luca
Tags:exe FormBook UPX
File size (compressed) :731'136 bytes
File size (de-compressed) :1'237'504 bytes
Format:win32/pe
Unpacked file: f273faa36ce80530b010b467cebaa8a61ee6ad36754314f85e82b4079f34824a

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
AutoIt PEPacker
Details
AutoIt
extracted scripts and files
PEPacker
a UPX version number and an unpacked binary
Malware family:
n/a
ID:
1
File name:
2dd253e781e494e124b22c3b4422b181bdf3eddfdc76e68cd464fc38f59775e7
Verdict:
No threats detected
Analysis date:
2026-02-05 15:06:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit compiled-script fingerprint lolbin microsoft_visual_cc netsh packed packed packed reg upx
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-07T08:29:00Z UTC
Last seen:
2026-02-05T04:55:00Z UTC
Hits:
~1000
Verdict:
Malware
YARA:
5 match(es)
Tags:
AutoIt Decompiled Executable PE (Portable Executable) PE File Layout Suspect Win 32 Exe x86
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2026-01-07 11:26:36 UTC
File Type:
PE (Exe)
Extracted files:
51
AV detection:
28 of 36 (77.78%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
unc_loader_001
Similar samples:
Result
Malware family:
n/a
Score:
  5/10
Tags:
discovery upx
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
AutoIT Executable
UPX packed file
Unpacked files
SH256 hash:
2dd253e781e494e124b22c3b4422b181bdf3eddfdc76e68cd464fc38f59775e7
MD5 hash:
2ebd2389ea6ae3114b121378fa281eca
SHA1 hash:
09036790dd956540ac61c572e48a58c194a18e66
SH256 hash:
f273faa36ce80530b010b467cebaa8a61ee6ad36754314f85e82b4079f34824a
MD5 hash:
82bba08ea0bbe5fcb2a67c394c421ab5
SHA1 hash:
4be059b7e6b2e5ef3fb6ecb7aecf3ef55c7ac084
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Formbook

Executable exe 2dd253e781e494e124b22c3b4422b181bdf3eddfdc76e68cd464fc38f59775e7

(this sample)

Comments