MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6174325a618dc0074601bbf4181a7cac9245e99449ebf0a8080511fbe3e7c62e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 19
| SHA256 hash: | 6174325a618dc0074601bbf4181a7cac9245e99449ebf0a8080511fbe3e7c62e |
|---|---|
| SHA3-384 hash: | c9f6e023d8388025638a11540ab1a6fe2fe5f9b3674842b14d7e06387849e8c846312bc22883c2891612bd9dfbda2206 |
| SHA1 hash: | 751637a10650b7398e358b977e89f8ffc7127e32 |
| MD5 hash: | 1f27e4b60d8457d99c063cf18e81a31f |
| humanhash: | green-ten-friend-asparagus |
| File name: | Supply proposal For #PO02346611pdf.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 864'264 bytes |
| First seen: | 2025-05-07 09:57:50 UTC |
| Last seen: | 2025-05-11 10:40:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 12288:5K3nWLhUWRz8FGmVwVHGs84IDI1X72Gj93oEbo7YbTVrUM5d+bAzxrJ+9RRhkA0d:5YnyUWismVOL2GB3oVYbpz8kC9OA0lr |
| TLSH | T19605E0197668AF52D4765BF805A0F9341BF12E0FA429E2465FD66CEFB861F001F08B93 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| dhash icon | 79d4c8a8d4e87190 (3 x AgentTesla, 2 x Formbook, 1 x Loki) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables signed with stolen, revoked or invalid certificates |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.