MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4887a457b13116ba350d59cd80c988c03c65ed89097c9da8d8037a3af9fbd666. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 4887a457b13116ba350d59cd80c988c03c65ed89097c9da8d8037a3af9fbd666
SHA3-384 hash: 479303f52f72f2f546be1bd09cf2a33bb3aa1f31240cf5f2f97d5a068c24c58e88c4c5f165baae04e07898033e8a778f
SHA1 hash: 566120811db5e09e614bca298d1f416cb95a5190
MD5 hash: 8b17f1ff17085d380b586b7aafee9f07
humanhash: bacon-pasta-louisiana-cold
File name:Pedido de Cotação nº 08042026.vbs
Download: download sample
Signature Formbook
File size:2'898'805 bytes
First seen:2026-04-08 15:03:40 UTC
Last seen:Never
File type:Visual Basic Script (vbs) vbs
MIME type:text/csv
ssdeep 3072:sh9cRyn0PohmCHHZFASfK5eLYtTEiwANcN/ms8DVIfJgVPfvACcDc9ZFASfpyz9P:S
TLSH T1F3D50E5291214DEF9AB2CA8EEE45A8F8DC171452F20BC3DD0E16EF4C2875240F56A79F
Magika txt
Reporter JAMESWT_WT
Tags:FormBook Spam-ITA vbs

Intelligence


File Origin
# of uploads :
1
# of downloads :
62
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
File Type:
text.utf8
First seen:
2026-04-08T09:29:00Z UTC
Last seen:
2026-04-10T09:30:00Z UTC
Hits:
~1000
Detections:
Trojan.VBS.SAgent.sb Trojan.JS.SAgent.sb HEUR:Trojan.VBS.SAgent.gen HEUR:Trojan.Script.Generic HEUR:Trojan-Downloader.Script.Generic
Verdict:
Malware
YARA:
1 match(es)
Tags:
VBScript WScript.Shell
Threat name:
Script-WScript.Trojan.Generic
Status:
Suspicious
First seen:
2026-04-08 15:04:32 UTC
File Type:
Binary
AV detection:
8 of 38 (21.05%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery execution persistence rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
System Location Discovery: System Language Discovery
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of SetThreadContext
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Formbook
Formbook family
Formbook payload
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments