MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 659b3b4e08eff4f11d34a5b455953db929fa602dd679fee34b53a964c350d0db. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 659b3b4e08eff4f11d34a5b455953db929fa602dd679fee34b53a964c350d0db
SHA3-384 hash: 5454102a18517ef745bc0e958587f99220d4e6ff000c15d11b70e6be9a0229611a11bff7484b36efad56c5f95ae2d246
SHA1 hash: 68fe291c8f862392f1187a95bbfff0b24b93d896
MD5 hash: 708b37bdb4d82064b05415d7dbd62c8c
humanhash: jersey-london-connecticut-fourteen
File name:09989876543213.JS
Download: download sample
Signature Formbook
File size:4'545'220 bytes
First seen:2026-03-16 13:25:01 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 98304:yd9gCe5DNIGFkmw+OchxF/dp4w2Gl7FEHYEcsakfFSMwBLCqg0v1pEBsZ+VzSX1r:K1e5DqGFkmHLFlp4wjgaID0dOK6SHqc
TLSH T10E26F741A75C49785CAF1F6DD1B3B1409E0E203E38C5A71E7A7A3B50BB5684B8F386E1
Magika javascript
Reporter James_inthe_box
Tags:exe FormBook js

Intelligence


File Origin
# of uploads :
1
# of downloads :
185
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
81.4%
Tags:
obfuscate xtreme blic
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
aes base64 base64 base64 crypto evasive obfuscated obfuscated obfuscated packed powershell privilege reconnaissance repaired
Verdict:
Malicious
File Type:
js
Detections:
Trojan-Downloader.JS.SLoad.sb Trojan.JS.SAgent.sb PDM:Trojan.Win32.Generic HEUR:Trojan.PowerShell.Tesre.sb HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Win32.Agentb.gen HEUR:Trojan.Script.Generic
Gathering data
Verdict:
Malicious
Threat:
Trojan-Downloader.JS.SLoad
Threat name:
Script-JS.Trojan.Generic
Status:
Suspicious
First seen:
2026-03-16 08:59:53 UTC
File Type:
Binary
AV detection:
8 of 38 (21.05%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Formbook payload
Formbook
Formbook family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments