MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d8be1b8c4032e74447e04189d711c80cc41e4df6ffd2b4539fb1195148276e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 9d8be1b8c4032e74447e04189d711c80cc41e4df6ffd2b4539fb1195148276e6
SHA3-384 hash: 337e7e13363e5451350d377ed7226a059924645f9daf0a9b7448dd528d153daf95d3043d8cf9ab3c74c920e7f93a8978
SHA1 hash: 448551097283405ec7dc6d2e5abee96e7f8358c7
MD5 hash: 7f67161d19ad39509ae77b73139c8d3a
humanhash: spring-green-florida-equal
File name:PO017642.js
Download: download sample
Signature Formbook
File size:63'661 bytes
First seen:2026-02-09 14:57:34 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 192:pa/S/qIdtCqWGbTlu09GCAHbhicKoDeiaSd+W9gbfwbbgm45OORaPjKVq05KLmOn:v9Gi5OVYDSM0f/vMR8NdgyBXzl4FURn
Threatray 2'676 similar samples on MalwareBazaar
TLSH T1A453A920C11472858900D692E9A48B4FCB95CD6473226DF6F42F5CEDBBD65B32E1B8BC
Magika javascript
Reporter James_inthe_box
Tags:exe FormBook js

Intelligence


File Origin
# of uploads :
1
# of downloads :
165
Origin country :
US US
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
81.4%
Tags:
malware
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm fingerprint repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-02-08T22:08:00Z UTC
Last seen:
2026-02-10T07:30:00Z UTC
Hits:
~10
Detections:
Trojan-Downloader.PowerShell.NanoShield.sb Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script-JS.Backdoor.FormBook
Status:
Malicious
First seen:
2026-02-09 00:59:14 UTC
File Type:
Text (JavaScript)
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook defense_evasion discovery execution rat spyware stealer trojan
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Command and Scripting Interpreter: PowerShell
Badlisted process makes network request
Formbook payload
Formbook
Formbook family
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments