MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b09815e57f2df812357bdacd5fed62ca635e392fd9ffc440fb3e2a5cc15eb39b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: b09815e57f2df812357bdacd5fed62ca635e392fd9ffc440fb3e2a5cc15eb39b
SHA3-384 hash: 5663748a4fb5e528d6102df95975be55281f9481edf9d1d71c6599deec61569f54c9d27a666dcf23629bfa42d1c954ff
SHA1 hash: e75586b3c5df32473403d131bae7b012b1cff034
MD5 hash: 7f24548eea69c95523b877b53ed7767d
humanhash: hydrogen-fifteen-michigan-alpha
File name:b09815e57f2df812357bdacd5fed62ca635e392fd9ffc440fb3e2a5cc15eb39b
Download: download sample
Signature Formbook
File size:1'041'408 bytes
First seen:2026-05-08 12:47:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'935 x AgentTesla, 19'826 x Formbook, 12'310 x SnakeKeylogger)
ssdeep 24576:uGE8P0sD4UuPMAG/7VIb/GVk7SwnSFGBbvin1U7WX:qYXDdEMsbbmGBbayW
TLSH T16C251109A3ACDB11E9BA8BF42A71D17047B63D9DA960C2474FC5BEDFB839B100A45743
TrID 73.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.6% (.EXE) Win64 Executable (generic) (6522/11/2)
4.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
77
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b09815e57f2df812357bdacd5fed62ca635e392fd9ffc440fb3e2a5cc15eb39b.exe
Verdict:
No threats detected
Analysis date:
2026-05-08 13:06:31 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Creating a process with a hidden window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Adding an exclusion to Microsoft Defender
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed ransomware vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-09T06:18:00Z UTC
Last seen:
2026-05-01T09:13:00Z UTC
Hits:
~100
Gathering data
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2026-04-09 09:35:18 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
24 of 36 (66.67%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Family: Formbook
Formbook payload
Unpacked files
SH256 hash:
b09815e57f2df812357bdacd5fed62ca635e392fd9ffc440fb3e2a5cc15eb39b
MD5 hash:
7f24548eea69c95523b877b53ed7767d
SHA1 hash:
e75586b3c5df32473403d131bae7b012b1cff034
SH256 hash:
16002f8e5b9a32d95085564f3950235f7707bf1f288338b87c153ed9b5cd1b5a
MD5 hash:
677b8e69f744b9fbb9407f2f87c606aa
SHA1 hash:
0cac5cf280225f7378c4678ff8d0795c610963e5
SH256 hash:
7d3aeb42939734fb6031c9a5df939e92a5430107e48adb9e9ba7449996d4b6ed
MD5 hash:
0d016d1826a8b3318a90bda23e8b5cb7
SHA1 hash:
0f7ea70b131217ec310a6df95b2771127c9ec41f
SH256 hash:
01d609d9a5cdea57ac3ae18950a052af1987830e8a02bde97302e7bd5d7a1efc
MD5 hash:
891849e83439b44ee87ab12ba064f9e3
SHA1 hash:
7b7b8a2afa384ec53a5164c96f55ff5916f49ce7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments