MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a21cea52a66cb02df71c42492bf7acf4d6393327fc9cfc20a7dbf246477df853. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 18
| SHA256 hash: | a21cea52a66cb02df71c42492bf7acf4d6393327fc9cfc20a7dbf246477df853 |
|---|---|
| SHA3-384 hash: | fc6876b2652c009ebda0f8978548b72469c9c3b2a6896d59a7a014bcd03ea9e675af529755ab8499ce9e1714c2d21611 |
| SHA1 hash: | 373e0908dbd752f4a0b80b8b82cebb2d03922695 |
| MD5 hash: | 358de6611c73ddb680afe724604b02e0 |
| humanhash: | fruit-indigo-five-happy |
| File name: | Order#NB012616.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 1'141'248 bytes |
| First seen: | 2026-01-16 13:16:22 UTC |
| Last seen: | 2026-01-16 14:44:21 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 91d07a5e22681e70764519ae943a5883 (126 x Formbook, 32 x a310Logger, 27 x AgentTesla) |
| ssdeep | 24576:qtb20pkaCqT5TBWgNQ7abG7ahLJME2U6A:XVg5tQ7abGiJrf5 |
| TLSH | T16835CF2373EE8361C3B25173BA55B701AEBF782506B5F86B2FD8093DE920121525E673 |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10522/11/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4504/4/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
CHVendor Threat Intelligence
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
11ac85099031a8d3c666ae8295d1b36a0115bd9b3c319481ee7f39450613054a
a21cea52a66cb02df71c42492bf7acf4d6393327fc9cfc20a7dbf246477df853
ca1d88d18d99a6f7f3fbe805327a369ba75594669c02d8f86e30f1ad8c56a2b4
0cc5a2fd9f73331cd37bef1667d4057e325c098602c61de8aa3a94cfe08cc519
ccb84b327afb07bccbe3367be35abe53ccb8f0ad9a815bb098e30029387def10
8a226b58f29599b98ff089f0dd5ecb845dbac90982ed15337734886e15912952
60cd8949dd366aa94383409dde4e7840d85db4f2cea2eef7f773b9fe2d36bc68
544c6d4ae8075826b97fd416d9ff441989a785bf3e945851494d0db18728f604
9fc9401b548091b02b74da0ea58aa279db23c47c5ab2bfaacea4605df89d511d
750d0ef6eaaac00190a10d38493cf765fcb9a9076ecf4d52ca356af4a650585f
626bb341a8d9ec79994bc12565a9f3c4c6944dc79ba65d66aa35fc9d9ff7e5f4
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AutoIT_Compiled |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious. |
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | dgaagas |
|---|---|
| Author: | Harshit |
| Description: | Uses certutil.exe to download a file named test.txt |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | TH_Generic_MassHunt_Win_Malware_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Generic Windows malware mass-hunt rule - 2025 |
| Reference: | https://cyfare.net/ |
| Rule name: | TH_Win_ETW_Bypass_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Windows ETW Bypass Detection Rule - 2025 |
| Reference: | https://cyfare.net/ |
| Rule name: | YahLover |
|---|---|
| Author: | Kevin Falcoz |
| Description: | YahLover |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.