MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 43d017af753a5790deabd17c4cd77bac6a6d33f7a889745319fcff7e32507756. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: 43d017af753a5790deabd17c4cd77bac6a6d33f7a889745319fcff7e32507756
SHA3-384 hash: 9bce19adcd76dd1c6c8de83d794b81a834ef155f07dc20cf4814024a149f738d53c9c21fb933e0141ea9c78a6677a302
SHA1 hash: d3c2ffe24edb862bdf0e3452216f30d25ff2d8a0
MD5 hash: ec59f01b184e146b745219c4d34332dc
humanhash: oklahoma-mountain-sierra-coffee
File name:Zamówienie - RX0490811.scr
Download: download sample
Signature Formbook
File size:822'280 bytes
First seen:2025-08-12 07:36:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:6KyxEuX1vfXFoqd8PweOwtESpOlBQN+fcA+Skw+IQ18EjBnkR:t3ulHsPwenESOW+NTXQdk
Threatray 79 similar samples on MalwareBazaar
TLSH T1D9050196E1448423C9DB1FF8DDE3DE3022BB2FE56410D3025EC5BE9BBAB73564126246
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 001b1b5e1f2e0618 (7 x AgentTesla, 1 x NanoCore, 1 x Formbook)
Reporter Anonymous
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
55
Origin country :
PL PL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Zamówienie - RX0490811.scr
Verdict:
Malicious activity
Analysis date:
2025-08-12 07:41:58 UTC
Tags:
netreactor auto-sch-xml formbook xloader stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expired-cert invalid-signature masquerade packed signed
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1755182 Sample: Zam#U00f3wienie - RX0490811.scr Startdate: 12/08/2025 Architecture: WINDOWS Score: 100 71 www.factio.xyz 2->71 73 www.computational360.xyz 2->73 75 17 other IPs or domains 2->75 77 Suricata IDS alerts for network traffic 2->77 79 Sigma detected: Scheduled temp file as task from temp location 2->79 81 Multi AV Scanner detection for submitted file 2->81 85 6 other signatures 2->85 11 Zam#U00f3wienie - RX0490811.scr 7 2->11         started        15 NYdyqXh.exe 5 2->15         started        17 svchost.exe 1 1 2->17         started        signatures3 83 Performs DNS queries to domains with low reputation 73->83 process4 dnsIp5 57 C:\Users\user\AppData\Roaming57YdyqXh.exe, PE32 11->57 dropped 59 C:\Users\user\AppData\Local\...\tmpB9E8.tmp, XML 11->59 dropped 61 C:\...\Zam#U00f3wienie - RX0490811.scr.log, ASCII 11->61 dropped 91 Adds a directory exclusion to Windows Defender 11->91 20 Zam#U00f3wienie - RX0490811.scr 11->20         started        23 powershell.exe 23 11->23         started        25 powershell.exe 23 11->25         started        27 schtasks.exe 1 11->27         started        93 Multi AV Scanner detection for dropped file 15->93 29 schtasks.exe 15->29         started        31 NYdyqXh.exe 15->31         started        69 127.0.0.1 unknown unknown 17->69 file6 signatures7 process8 signatures9 87 Maps a DLL or memory area into another process 20->87 33 AcbCwjdRr.exe 20->33 injected 89 Loading BitLocker PowerShell Module 23->89 35 conhost.exe 23->35         started        37 WmiPrvSE.exe 23->37         started        39 conhost.exe 25->39         started        41 conhost.exe 27->41         started        43 conhost.exe 29->43         started        process10 process11 45 PresentationHost.exe 33->45         started        signatures12 95 Tries to steal Mail credentials (via file / registry access) 45->95 97 Tries to harvest and steal browser information (history, passwords, etc) 45->97 99 Modifies the context of a thread in another process (thread injection) 45->99 101 3 other signatures 45->101 48 HEh6UxiIi.exe 45->48 injected 51 chrome.exe 45->51         started        53 firefox.exe 45->53         started        process13 dnsIp14 63 elementzone.shop 162.255.119.17, 49726, 49727, 49728 NAMECHEAP-NETUS United States 48->63 65 www.jellymint.site 209.74.64.189, 49734, 49735, 49736 MULTIBAND-NEWHOPEUS United States 48->65 67 8 other IPs or domains 48->67 55 WerFault.exe 51->55         started        process15
Gathering data
Threat name:
Win32.Backdoor.FormBook
Status:
Suspicious
First seen:
2025-08-12 06:21:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution persistence
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Unpacked files
SH256 hash:
43d017af753a5790deabd17c4cd77bac6a6d33f7a889745319fcff7e32507756
MD5 hash:
ec59f01b184e146b745219c4d34332dc
SHA1 hash:
d3c2ffe24edb862bdf0e3452216f30d25ff2d8a0
SH256 hash:
132b2d2cf684d2b4d832c3a5562a0f106fcc4e6d1784e3b20432497fb7a5caaa
MD5 hash:
6163d53f321204b3546cc5b35701dc4f
SHA1 hash:
171b24bfa368cb8a2dc1fcc3d4114e4be8ed5478
SH256 hash:
136a60c9c8c39591bd8dc97f1fb75cead5c9f8ed578ea0fee8a6732254dbd6d5
MD5 hash:
ff838709ab4f29234fdbe779e474fa2a
SHA1 hash:
80f5ae51201c00596589e050cdc445da93403991
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Parent samples :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 hash:
6b7a21a81eb3ce24ebbe256738beed6c0f3abd609c80e07e332ea5193e7402b9
MD5 hash:
f7134305535974faf52f6c38c79824f8
SHA1 hash:
da53cecbc41b21d9541ea3c08e6660fff87f6ab0
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
bc36a209f6ae58d12453cc593d2bb3ce9e9e567a53419ec98cf85de8584c1f1d
MD5 hash:
3dbea52f137a9f9538f1798745d2e2a5
SHA1 hash:
749c5386afc109704d34d369c5064588f0a57bd6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments