MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 330c824179c1db72ab7561a02f0b46cb4c08df18d8e35772e32001f5263601f1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 15
| SHA256 hash: | 330c824179c1db72ab7561a02f0b46cb4c08df18d8e35772e32001f5263601f1 |
|---|---|
| SHA3-384 hash: | a2aa0804cab96e06820de4b1f91e35044cea098ad0a4c5e24a2219c4d63f09c312a3f1b17cdaf36f1023f321f5bd59c9 |
| SHA1 hash: | dab70b42104c3864bb4defb081e8ab6f67ead3ab |
| MD5 hash: | 42b5ff787e146eb07149231a3d065e29 |
| humanhash: | victor-queen-nitrogen-sweet |
| File name: | 330c824179c1db72ab7561a02f0b46cb4c08df18d8e35772e32001f5263601f1 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'159'680 bytes |
| First seen: | 2025-12-08 15:12:30 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 91d07a5e22681e70764519ae943a5883 (119 x Formbook, 32 x a310Logger, 27 x AgentTesla) |
| ssdeep | 24576:Htb20pkaCqT5TBWgNQ7as/IEEOGbMyKHxaN2HTTa6A:EVg5tQ7as/SOGNKAcTG5 |
| Threatray | 2'734 similar samples on MalwareBazaar |
| TLSH | T11835CF2373DE8360C7B25273BA167712AE7F7C2506A1F95B2FD4293CA930121525EA73 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Details
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Formbook |
|---|---|
| Author: | kevoreilly |
| Description: | Formbook Payload |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | TH_Generic_MassHunt_Win_Malware_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Generic Windows malware mass-hunt rule - 2025 |
| Reference: | https://cyfare.net/ |
| Rule name: | YahLover |
|---|---|
| Author: | Kevin Falcoz |
| Description: | YahLover |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.