MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7c255e1da5023e24d8932926c2bef9335a210eae149d1e5236c92c9b5c89e9bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 20
| SHA256 hash: | 7c255e1da5023e24d8932926c2bef9335a210eae149d1e5236c92c9b5c89e9bc |
|---|---|
| SHA3-384 hash: | 61cdb3322eec01993b6bdcd8af25f58193e43cbd5923ac57b0c9fa0637bdac0bb1db801f14cfd93b009b3c54e1cc1a76 |
| SHA1 hash: | a70fddd81c757bcc549c610a801f05744b430bac |
| MD5 hash: | dd50a83bcf8d30a365e324a3c1460d12 |
| humanhash: | oregon-west-california-six |
| File name: | OGg7f1705TWAnui.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 614'400 bytes |
| First seen: | 2025-03-10 11:05:28 UTC |
| Last seen: | 2025-03-17 12:01:45 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:vfqRmRxFGMt2Q3xn+Sl1tBGY/+p8di3GMU:6qxFGMt2QkO3BGY/Vi2MU |
| Threatray | 4'783 similar samples on MalwareBazaar |
| TLSH | T10AD40154BA1DEB32DEA547F00A31D27103B94F5EF421E3899DEAACEB3431F522554A83 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.