MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 656fd275d35b686220d5e221c29b239b6f1462c526b97ae9c3f778ccd14fb2c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 656fd275d35b686220d5e221c29b239b6f1462c526b97ae9c3f778ccd14fb2c6
SHA3-384 hash: f802c69457beadb3f40a5bd8e035da393cb2d0b088575dd7162e205ddddd0523aa424f19c9bd29d0826d700c51c4755d
SHA1 hash: bb50e0aecc248a1c56e265c33b487b2701cfca57
MD5 hash: 979d8d0d2e5f1cd54641a49a9de98b77
humanhash: dakota-sweet-spaghetti-jig
File name:Enquiry.js
Download: download sample
Signature Formbook
File size:58'434 bytes
First seen:2025-09-24 09:10:18 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 1536:z1Jj0p9uZgnSxIEUMgnjJCb2zlconrnUcrF9z+o92EsqJrAoL+oj7rL97giudybi:p8S42
TLSH T1A74329EAED43952B5D139665CD756AC3CAA3411EF00ADE3C9A0D47C8FBD28A8C7097C4
Magika javascript
Reporter ShadowOpCode
Tags:FormBook js stego xloader

Intelligence


File Origin
# of uploads :
1
# of downloads :
327
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 evasive fingerprint obfuscated obfuscated powershell
Verdict:
Malicious
Labled as:
ObfuscatedDownloader.A.Generic
Verdict:
Malicious
File Type:
js
First seen:
2025-09-23T05:50:00Z UTC
Last seen:
2025-09-23T05:50:00Z UTC
Hits:
~100
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-23 11:12:39 UTC
File Type:
Text (JavaScript)
AV detection:
6 of 36 (16.67%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Suspicious use of SetThreadContext
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Process spawned unexpected child process
Malware Config
Dropper Extraction:
http://archive.org/download/optimized_MSI_PRO_with_b64/optimized_MSI_PRO_with_b64.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Formbook

Java Script (JS) js 656fd275d35b686220d5e221c29b239b6f1462c526b97ae9c3f778ccd14fb2c6

(this sample)

Comments