MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89a94d938e5067327e2156b2ee7d8062462f0d0b708378df45e85a2a8b752f2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA 5 File information Comments

SHA256 hash: 89a94d938e5067327e2156b2ee7d8062462f0d0b708378df45e85a2a8b752f2d
SHA3-384 hash: a00f75392fc9be7bb9d4b844a92ad53aa5468b92ddfd30e300d9966196d3c93c8ae0b935976adba8e8fb76d31e6bbbbb
SHA1 hash: 3e6da863a7b9985e1ba6d6cd7e015e50f8787db4
MD5 hash: b284e94207014b433a28fee4684f6b4a
humanhash: lake-skylark-eight-carolina
File name:456786545_pdf.LNK
Download: download sample
Signature Formbook
File size:202'587 bytes
First seen:2025-04-16 15:50:25 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 3072:eQRD0WEB6jOhUf7Z3Ud+Z6zKGUr46wE+rKxGf4VRvHMTBl7K+gxR5tUQfj3O:ep6jGSZ3Ud+ZmSr5UD4VtONK+WBb+
Threatray 2 similar samples on MalwareBazaar
TLSH T13B14F1554F272BCEFF251DF8065E255889D89C323E22C0E1DEAB2503C738DD596B2A27
Magika lnk
Reporter abuse_ch
Tags:FormBook lnk

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
phishing delphi remcos emotet
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Payload URLs
URL
File name
https://www.directdownloadlink.ru/wp-content/uploads/2025/04/r.txt','C:\\ProgramData\\HEW.GIF');
LNK File
Behaviour
BlacklistAPI detected
Result
Verdict:
MALICIOUS
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates many large memory junks
Antivirus detection for URL or domain
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops PE files with a suspicious file extension
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Powershell drops PE file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell DownloadFile
Sigma detected: Suspicious PowerShell Download and Execute Pattern
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows shortcut file (LNK) contains suspicious command line arguments
Windows shortcut file (LNK) starts blacklisted processes
Yara detected DBatLoader
Yara detected FormBook
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1666544 Sample: 456786545_pdf.LNK.lnk Startdate: 16/04/2025 Architecture: WINDOWS Score: 100 41 www.meacci.xyz 2->41 43 www.directdownloadlink.ru 2->43 45 4 other IPs or domains 2->45 63 Suricata IDS alerts for network traffic 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Antivirus detection for URL or domain 2->67 71 15 other signatures 2->71 10 powershell.exe 14 22 2->10         started        15 svchost.exe 1 1 2->15         started        signatures3 69 Performs DNS queries to domains with low reputation 41->69 process4 dnsIp5 51 www.directdownloadlink.ru 45.14.224.104, 443, 49715 SPECTRAIPSpectraIPBVNL Netherlands 10->51 39 C:\ProgramData\CHROME.PIF, PE32 10->39 dropped 75 Drops PE files with a suspicious file extension 10->75 77 Found suspicious powershell code related to unpacking or dynamic code loading 10->77 79 Powershell drops PE file 10->79 17 CHROME.PIF 5 10->17         started        20 conhost.exe 1 10->20         started        53 127.0.0.1 unknown unknown 15->53 file6 signatures7 process8 signatures9 55 Windows shortcut file (LNK) starts blacklisted processes 17->55 57 Multi AV Scanner detection for dropped file 17->57 59 Maps a DLL or memory area into another process 17->59 61 2 other signatures 17->61 22 Jhpk4M2W1afBQr.exe 17->22 injected 26 cmd.exe 1 17->26         started        28 cmd.exe 1 17->28         started        process10 dnsIp11 47 intention.digital 46.38.243.234, 49726, 49727, 49728 NETCUP-ASnetcupGmbHDE Germany 22->47 49 www.kdjsswzx.club 172.67.203.89, 49725, 80 CLOUDFLARENETUS United States 22->49 73 Found direct / indirect Syscall (likely to bypass EDR) 22->73 30 icsunattend.exe 13 22->30         started        33 conhost.exe 26->33         started        35 conhost.exe 28->35         started        signatures12 process13 signatures14 81 Tries to steal Mail credentials (via file / registry access) 30->81 83 Tries to harvest and steal browser information (history, passwords, etc) 30->83 85 Modifies the context of a thread in another process (thread injection) 30->85 87 2 other signatures 30->87 37 firefox.exe 30->37         started        process15
Threat name:
Win32.Trojan.Powdowhlnk
Status:
Malicious
First seen:
2025-04-16 06:58:53 UTC
File Type:
Binary
Extracted files:
1
AV detection:
15 of 38 (39.47%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader discovery execution trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Checks computer location settings
Executes dropped EXE
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
ModiLoader Second Stage
ModiLoader, DBatLoader
Modiloader family
Malware Config
Dropper Extraction:
https://www.directdownloadlink.ru/wp-content/uploads/2025/04/r.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:Large_filesize_LNK
Author:@bartblaze
Description:Identifies shortcut (LNK) file larger than 100KB. Most goodware LNK files are smaller than 100KB.
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_SuspiciousCommands
Author:Florian Roth (Nextron Systems)
Description:Detects LNK file with suspicious content

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments