MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56f885e189f739fdcc050dcd0bd01fd1e75147e744ede807a4ec2f3db40e5158. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments

SHA256 hash: 56f885e189f739fdcc050dcd0bd01fd1e75147e744ede807a4ec2f3db40e5158
SHA3-384 hash: c2896a8014f847f2f77fd3d0e1c421b6a8fe0bfe8150b401d7c2e68612a61d92a0c97af8496856b511cf186549d38cf5
SHA1 hash: 202606d470ec4eb2d3634f2bdc814e22d7e20d18
MD5 hash: 0c6bead7ebe95bd91cfad558fa0d943c
humanhash: kentucky-burger-friend-utah
File name:Payment Advice.zip
Download: download sample
Signature Formbook
File size:655'423 bytes
First seen:2025-11-20 08:16:14 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:HBsyOypFiutRYhuHgfE1xlr1OrCm5RTZxNfu10hLaEdLAIz8ZL1KLmOlmZRm:hvFlzYPE1xlr1Ix81AaEFt4ZLQmKmZ8
TLSH T1B5D423FE7968730586710FD9298CE26C2D7A17E0EFAFCDE7A50742A890C68451C578C6
Magika zip
Reporter cocaman
Tags:FormBook HSBC payment zip


Avatar
cocaman
Malicious email (T1566.001)
From: "HSBC Advising Service <advising.service@advising.hsbc.com>" (likely spoofed)
Received: "from advising.hsbc.com (unknown [198.12.90.236]) "
Date: "19 Nov 2025 21:36:08 -0800"
Subject: "Payment Advice - Advice Ref:[A2mkFwFJ76gh] / Priority payment / Customer "
Attachment: "Payment Advice.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Payment Advice.exe
File size:680'448 bytes
SHA256 hash: 53a26ac66dffdf3a6db7cc079ccca32790afc93166ec8a6f33c82cf1d26e08c8
MD5 hash: 8d58ded0f35be1a32ef5a28213b2794f
MIME type:application/x-dosexec
Signature Formbook
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
malware
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit compiled-script masquerade microsoft_visual_cc packed packed packed upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
zip
First seen:
2025-11-19T21:49:00Z UTC
Last seen:
2025-11-20T04:00:00Z UTC
Hits:
~10
Verdict:
Malware
YARA:
3 match(es)
Tags:
AutoIt Decompiled Executable PE (Portable Executable) PE File Layout Suspect Zip Archive
Threat name:
Win32.Trojan.AutoitInject
Status:
Malicious
First seen:
2025-11-20 06:39:10 UTC
File Type:
Binary (Archive)
Extracted files:
53
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery rat spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
AutoIT Executable
Suspicious use of SetThreadContext
UPX packed file
Formbook payload
Formbook
Formbook family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:win_upx_packed
Author:Reedus0
Description:Rule for detecting UPX packed malware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

zip 56f885e189f739fdcc050dcd0bd01fd1e75147e744ede807a4ec2f3db40e5158

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
Formbook

Comments