MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6f9e34863853070a83fe44a06f719728e232499d2f8c1481aa4b9d1ea5e116ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | 6f9e34863853070a83fe44a06f719728e232499d2f8c1481aa4b9d1ea5e116ec |
|---|---|
| SHA3-384 hash: | ababdebcf6924de732e0d025a8a7453e5b176b966886f5f68806d3d24cc60839d2339695d2a1c17ddc15902cce6c810e |
| SHA1 hash: | 21f684a03efda741ff4a8d367f3e3bdd322f998b |
| MD5 hash: | 0134c2c09c1bbb2e743fb8df3d389938 |
| humanhash: | charlie-east-delta-tennis |
| File name: | 6f9e34863853070a83fe44a06f719728e232499d2f8c1481aa4b9d1ea5e116ec |
| Download: | download sample |
| Signature | Formbook |
| File size: | 726'016 bytes |
| First seen: | 2025-11-06 10:55:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 21371b611d91188d602926b15db6bd48 (70 x Formbook, 33 x AgentTesla, 20 x RemcosRAT) |
| ssdeep | 12288:Bz7hU5I5yuNHIgzSFKxWltRohBfSTso93UVJ8sCEP4raCIBLmXb2lKizjvY:Bf+iN57Gtene3OKYpCyLiXi3Q |
| Threatray | 2'099 similar samples on MalwareBazaar |
| TLSH | T153F4229199D28A51C14A7270C832CC6485B4BAB1DE56332D872DE2BEFC71387CA37B5D |
| TrID | 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 7.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.9% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook UPX |
UPX packed
This file is packed with UPX. We have therefore unpacked the file. Below is furhter information about the unpacked (de-compressed) file.
| File size (compressed) : | 726'016 bytes |
|---|---|
| File size (de-compressed) : | 1'232'384 bytes |
| Format: | win32/pe |
| Unpacked file: | a9682daf05dd3a2cc280d1d8682aa875d8d3957e3e2b282af76139c3c3fc8397 |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.