MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e10d2c5c38e0d5887348e83cb1141988c7444b3fe1c7d6d7b3ac2abae3ac49c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 21


Intelligence 21 IOCs YARA 4 File information Comments

SHA256 hash: 7e10d2c5c38e0d5887348e83cb1141988c7444b3fe1c7d6d7b3ac2abae3ac49c
SHA3-384 hash: d03d81238ba3764961ba9013df01cc278803db18af3e203f9b3b63fee59d30913fc50459a0282f5c92e435f55ba0d06c
SHA1 hash: dbc6aefbbb0b616e827e9625df54037e8f94cdae
MD5 hash: 8254137f463b8efde6590cb0934a1aa6
humanhash: idaho-rugby-yellow-two
File name:y6JpZX20JbOHoJQ.exe
Download: download sample
Signature Formbook
File size:744'448 bytes
First seen:2025-10-28 12:36:27 UTC
Last seen:2025-11-06 11:33:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'603 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:xWmqIjiqL5W+DQiGMOJcTuJKKVe1Wo9kIdD3Nl9FFvg9t06:YmZZZ5Oy6J/Ve1WK3Rgf
Threatray 2'013 similar samples on MalwareBazaar
TLSH T14BF402442AD9E6C7D4A147B40EB2F07127B92E667810DE1A9ECA2DDF7532F004871B6F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter cocaman
Tags:exe FormBook payment

Intelligence


File Origin
# of uploads :
3
# of downloads :
133
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
y6JpZX20JbOHoJQ.exe
Verdict:
Suspicious activity
Analysis date:
2025-10-28 12:39:38 UTC
Tags:
auto-sch-xml formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
micro spawn msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Creating a file
Creating a window
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed packed packer_detected vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-28T09:58:00Z UTC
Last seen:
2025-10-28T22:35:00Z UTC
Hits:
~100
Detections:
Trojan-Spy.Noon.HTTP.ServerRequest HEUR:Trojan-PSW.MSIL.DarkCloud.gen Backdoor.Agent.HTTP.C&C Trojan.MSIL.Crypt.sb PDM:Trojan.Win32.Generic Trojan.MSIL.Taskun.sb Trojan-Spy.Win32.Noon.sb Trojan.Win32.Agent.sb Trojan.MSIL.Inject.sb HEUR:Trojan.MSIL.Taskun.sb
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1803188 Sample: y6JpZX20JbOHoJQ.exe Startdate: 28/10/2025 Architecture: WINDOWS Score: 100 42 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->42 44 Sigma detected: Scheduled temp file as task from temp location 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 5 other signatures 2->48 7 y6JpZX20JbOHoJQ.exe 7 2->7         started        11 WPlEexbgJ.exe 5 2->11         started        process3 file4 34 C:\Users\user\AppData\Roaming\WPlEexbgJ.exe, PE32 7->34 dropped 36 C:\Users\...\WPlEexbgJ.exe:Zone.Identifier, ASCII 7->36 dropped 38 C:\Users\user\AppData\Local\...\tmpC5EB.tmp, XML 7->38 dropped 40 C:\Users\user\...\y6JpZX20JbOHoJQ.exe.log, ASCII 7->40 dropped 50 Uses schtasks.exe or at.exe to add and modify task schedules 7->50 52 Writes to foreign memory regions 7->52 54 Allocates memory in foreign processes 7->54 56 Adds a directory exclusion to Windows Defender 7->56 13 powershell.exe 23 7->13         started        16 schtasks.exe 1 7->16         started        18 MSBuild.exe 7->18         started        20 MSBuild.exe 7->20         started        58 Multi AV Scanner detection for dropped file 11->58 60 Injects a PE file into a foreign processes 11->60 22 schtasks.exe 1 11->22         started        24 MSBuild.exe 11->24         started        signatures5 process6 signatures7 62 Loading BitLocker PowerShell Module 13->62 26 WmiPrvSE.exe 13->26         started        28 conhost.exe 13->28         started        30 conhost.exe 16->30         started        32 conhost.exe 22->32         started        process8
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.50 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.DarkCloud
Status:
Malicious
First seen:
2025-10-28 12:37:27 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery execution persistence rat spyware stealer trojan
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Unpacked files
SH256 hash:
7e10d2c5c38e0d5887348e83cb1141988c7444b3fe1c7d6d7b3ac2abae3ac49c
MD5 hash:
8254137f463b8efde6590cb0934a1aa6
SHA1 hash:
dbc6aefbbb0b616e827e9625df54037e8f94cdae
SH256 hash:
4875841d3ac1e34c5b5b82606369a2e1e57f4a553ded1d58fc552ac929ef93dd
MD5 hash:
af535c01a1857b963ea38ef385df7c41
SHA1 hash:
b125eaf16e23199ea0887414a52e1ee2edf352e6
SH256 hash:
c14873c306178229a1557ff5131de4d5b72b19e3bebd091bffb4a3437eb49d3b
MD5 hash:
6c14cd52b374700afddcc7d1f63cc89c
SHA1 hash:
5b2769a757ad3af24e1d72ea19f00c27b9bae0fe
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
90f452e844a592525466ba837f3e07d63d995447af84c2d50c4087062341eeb7
MD5 hash:
7f70068f0284542ca7bd9e051eac50b1
SHA1 hash:
9b114dcef139cb3a93fd0f6bbe45b7cf203a918b
SH256 hash:
81c878e71a82aa8f4175648d188a1f75acf99cd0b02ef0f48e814fb4f44f0fc0
MD5 hash:
2c401550efe4777b67fa67fb7cecdfbc
SHA1 hash:
e5515434b9685499ad38499f4b59ed8c017b88b4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Formbook

Executable exe 7e10d2c5c38e0d5887348e83cb1141988c7444b3fe1c7d6d7b3ac2abae3ac49c

(this sample)

Comments