MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8809ba6b44384ec42e2b54ca885c37496f8d342eb430addeb8f760e2a1fed146. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 8809ba6b44384ec42e2b54ca885c37496f8d342eb430addeb8f760e2a1fed146
SHA3-384 hash: 8202eee3a5bc8a58b2ab72a4cfddab8643ac75a3901872b31e74cddcfc7b0da8d9ebdb617a3433e9f04537720c15c667
SHA1 hash: 4a1bb4620c760f6b5b85932e5a1a1cc38310a698
MD5 hash: 9f148713281e95a51da144e79bc3e944
humanhash: oranges-delaware-avocado-angel
File name:024136.js
Download: download sample
Signature Formbook
File size:63'762 bytes
First seen:2026-04-09 08:03:15 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 192:3TNAcLVirZX2Q5wYH9jD7+70x7+FzGx7hTP4PjN0kAjKs1V6AvB/xbQqWFUxI7s0:3pLLez4+293fh2ALwI3w1L4Oe3ebM
TLSH T1A153FD54859C8B658AC7DBD06D0DAB49A10F7E6F0CF5D06A7A4FECDBC13678440CBA82
Magika javascript
Reporter abuse_ch
Tags:FormBook js

Intelligence


File Origin
# of uploads :
1
# of downloads :
123
Origin country :
SE SE
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
96.5%
Tags:
xtreme shell sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive fingerprint formbook lolbin repaired wscript
Verdict:
Malicious
File Type:
js
First seen:
2026-04-08T02:20:00Z UTC
Last seen:
2026-04-11T06:09:00Z UTC
Hits:
~1000
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Result
Threat name:
FormBook
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Creates multiple autostart registry keys
Creates processes via WMI
Excessive usage of taskkill to terminate processes
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
JavaScript source code contains functionality to generate code involving a shell, file or stream
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Decrypt And Execute Base64 Data
Sigma detected: Register Wscript In Run Key
Sigma detected: Suspicious PowerShell IEX Execution Patterns
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected FormBook
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1895796 Sample: 024136.js Startdate: 09/04/2026 Architecture: WINDOWS Score: 100 93 www.zingel.autos 2->93 95 www.unstone.online 2->95 97 13 other IPs or domains 2->97 111 Sigma detected: Register Wscript In Run Key 2->111 113 Suricata IDS alerts for network traffic 2->113 115 Malicious sample detected (through community Yara rule) 2->115 117 14 other signatures 2->117 10 powershell.exe 15 21 2->10         started        15 powershell.exe 2->15         started        17 wscript.exe 2->17         started        19 10 other processes 2->19 signatures3 process4 dnsIp5 99 hasteb.in 45.33.64.25, 443, 49697, 49707 LINODE-APLinodeLLCUS United States 10->99 101 pastefy.app 172.67.188.196, 443, 49698, 49708 CLOUDFLARENETUS United States 10->101 91 C:\ProgramData\haIjdad.js, ASCII 10->91 dropped 147 Suspicious powershell command line found 10->147 149 Creates multiple autostart registry keys 10->149 151 Writes to foreign memory regions 10->151 153 Found suspicious powershell code related to unpacking or dynamic code loading 10->153 21 RegAsm.exe 10->21         started        24 powershell.exe 12 10->24         started        26 conhost.exe 10->26         started        155 Excessive usage of taskkill to terminate processes 15->155 157 Injects a PE file into a foreign processes 15->157 28 powershell.exe 15->28         started        36 4 other processes 15->36 30 powershell.exe 17->30         started        32 powershell.exe 17->32         started        103 127.0.0.1 unknown unknown 19->103 159 Wscript starts Powershell (via cmd or directly) 19->159 161 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->161 163 Suspicious execution chain found 19->163 165 Creates processes via WMI 19->165 34 powershell.exe 19->34         started        38 4 other processes 19->38 file6 signatures7 process8 signatures9 119 Maps a DLL or memory area into another process 21->119 121 Unusual module load detection (module proxying) 21->121 40 GTUMZgzUmLj.exe 21->40 injected 43 cmd.exe 1 24->43         started        45 conhost.exe 24->45         started        123 Creates processes via WMI 26->123 53 2 other processes 28->53 125 Suspicious powershell command line found 30->125 127 Creates multiple autostart registry keys 30->127 129 Writes to foreign memory regions 30->129 131 Injects a PE file into a foreign processes 30->131 47 powershell.exe 30->47         started        55 2 other processes 30->55 49 conhost.exe 32->49         started        57 2 other processes 34->57 51 conhost.exe 36->51         started        process10 signatures11 133 Maps a DLL or memory area into another process 40->133 59 SecEdit.exe 13 40->59         started        135 Excessive usage of taskkill to terminate processes 43->135 62 taskkill.exe 1 43->62         started        64 taskkill.exe 1 43->64         started        66 taskkill.exe 1 43->66         started        68 conhost.exe 43->68         started        70 cmd.exe 47->70         started        72 conhost.exe 47->72         started        74 4 other processes 53->74 76 4 other processes 57->76 process12 signatures13 137 Tries to steal Mail credentials (via file / registry access) 59->137 139 Tries to harvest and steal browser information (history, passwords, etc) 59->139 141 Modifies the context of a thread in another process (thread injection) 59->141 145 4 other signatures 59->145 78 XEbNtjFj3L.exe 59->78 injected 81 firefox.exe 59->81         started        143 Excessive usage of taskkill to terminate processes 70->143 83 conhost.exe 70->83         started        85 taskkill.exe 70->85         started        87 taskkill.exe 70->87         started        89 taskkill.exe 70->89         started        process14 dnsIp15 105 www.riseproducts.net 5.22.145.155, 49712, 49714, 49715 KEY-SYSTEMS-ASImOberenWerk1DE Germany 78->105 107 www.edenbrookchingming.com 178.128.239.245, 49705, 80 DIGITALOCEAN-ASNUS Netherlands 78->107 109 3 other IPs or domains 78->109
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Script-JS.Trojan.Acsogenixx
Status:
Malicious
First seen:
2026-04-09 02:07:26 UTC
File Type:
Text (JavaScript)
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Command and Scripting Interpreter: JavaScript
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Process spawned unexpected child process
Malware family:
HomeesNETInjector
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments