MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a85868fada912b766b75721172bd8d3c741cb29811490fd8e9f53832712fe89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 9a85868fada912b766b75721172bd8d3c741cb29811490fd8e9f53832712fe89
SHA3-384 hash: 650cc8b8d83ec82f04ba12d1ec9eb7f1294a4deaf2745859e405b5bb9bbbc04d7ee231643a393eec72158e97f3d45d8d
SHA1 hash: 6adc31b28109292604c349c7b2244f374af05ad8
MD5 hash: cae9776f12090cc823dea9ead36dff4b
humanhash: quiet-mockingbird-nineteen-march
File name:aaasda.js
Download: download sample
Signature Formbook
File size:46'272 bytes
First seen:2025-09-05 06:53:19 UTC
Last seen:2025-09-08 13:51:14 UTC
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 96:CAfK6PVSVjVdC8cqzg4ALmW8tvsK6iLfc9RTfFHV19HqFQcviXR+s:N7P+VdCrOFQqv9jLWRTdV/KFQcvIR+s
Threatray 135 similar samples on MalwareBazaar
TLSH T11D23B7409B53DEB9FC29941FA488208A045EE49B866FCAF50E3339E0937155DF497EEC
Magika javascript
Reporter Anonymous
Tags:FormBook js

Intelligence


File Origin
# of uploads :
3
# of downloads :
67
Origin country :
PL PL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 evasive fingerprint obfuscated obfuscated powershell
Verdict:
Malicious
File Type:
js
First seen:
2025-09-04T19:28:00Z UTC
Last seen:
2025-09-04T19:28:00Z UTC
Hits:
~10000
Detections:
Trojan.Agentb.TCP.C&C Trojan.JS.SAgent.sb HEUR:Trojan-Downloader.Script.Generic HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-09-05 05:28:29 UTC
File Type:
Binary
AV detection:
9 of 37 (24.32%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Suspicious use of SetThreadContext
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://archive.org/download/optimized_msi_20250904/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments