MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39d4b2c2f232d51c44e28e77ef48a8f57803f053f7ab864de307f6a45fe5705e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 39d4b2c2f232d51c44e28e77ef48a8f57803f053f7ab864de307f6a45fe5705e
SHA3-384 hash: f126086729a0338dc8c57c08dc108df5285c7a11e778c97d95ca0ef3bafe239c73d67377e20f552947c84c831d045666
SHA1 hash: 18356f3d4b4791b4afe369bde8ef25fb469a15cf
MD5 hash: bd114768aa1bacea1c5f54ff8c66d021
humanhash: mountain-orange-freddie-carpet
File name:Generalii-SB456365.js
Download: download sample
Signature Formbook
File size:64'063 bytes
First seen:2026-02-11 10:57:22 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 384:oRzWfdSZimtLZMtoBLha8NIDcuqYWMMwoDqK19ZrTXt8pJRQK/lkITJoDR+z2f3Q:oRfFNIDcuLGvEQA7okUt+
Threatray 2'686 similar samples on MalwareBazaar
TLSH T17F533E6081F505BB3770377099EFD6731BF9AE80EF51894827C63C9B8DCC6390A86A94
Magika javascript
Reporter Anonymous
Tags:FormBook js

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
CH CH
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
97.4%
Tags:
obfuscate xtreme shell
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm fingerprint repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-02-10T06:41:00Z UTC
Last seen:
2026-02-10T07:06:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.PowerShell.NanoShield.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script-JS.Backdoor.FormBook
Status:
Malicious
First seen:
2026-02-10 02:31:35 UTC
File Type:
Text (JavaScript)
AV detection:
11 of 38 (28.95%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Formbook payload
Formbook
Formbook family
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments