MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bb9a1bfefff16c8720092c4a5b23549b88ee1bde733dacdf082e226d41b2cc5a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 13
| SHA256 hash: | bb9a1bfefff16c8720092c4a5b23549b88ee1bde733dacdf082e226d41b2cc5a |
|---|---|
| SHA3-384 hash: | cedc64cd5becbd2223720a1695b95bae2b4ca001b99b342dd4b6352f456af5e2def8598cd0c8166c372c3e845b7e8cd7 |
| SHA1 hash: | 4d75cdb3485444a8e96e7d8d8fe8aa427fd85bf3 |
| MD5 hash: | 755d3931b654a6883371bfed168d7595 |
| humanhash: | carolina-wisconsin-north-aspen |
| File name: | SOA 69023456178.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 621'568 bytes |
| First seen: | 2023-07-03 09:05:37 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger) |
| ssdeep | 12288:Emce48JuxNGrzGGPGV542g2TGTUFYTkeUfcN:17uxMXGaEfTGThTWfu |
| Threatray | 3'210 similar samples on MalwareBazaar |
| TLSH | T19ED4593C1CBC5E23C174D2B68F95C421F558C6EB32A28F7667C7AA55460EA0229CBD3D |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | pe_imphash |
|---|
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_Formbook |
|---|---|
| Author: | @malgamy12 |
| Rule name: | Windows_Trojan_Formbook_1112e116 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_formbook_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.formbook. |
| Rule name: | win_formbook_w0 |
|---|---|
| Author: | @malgamy12 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.