MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc6c49eaa6a236fd76d53aa8a92741e21270f7c3fdf87f54848d2076e0d1fcdb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 17


Intelligence 17 IOCs YARA 11 File information Comments

SHA256 hash: cc6c49eaa6a236fd76d53aa8a92741e21270f7c3fdf87f54848d2076e0d1fcdb
SHA3-384 hash: d5cc1b24954d456ca1eff1c95c915d57c3a1cad6362f503d3f5146e630547aa1542257870bf5624182f9fd2a83488933
SHA1 hash: 4d1f0d2dc5ffe6d2e0d12b806e6bc2ff34d86db8
MD5 hash: 6eaa48487ed8cc8291818568acec2412
humanhash: social-burger-leopard-floor
File name:HSBC Payment Advice 04082025-PDF.exe
Download: download sample
Signature Formbook
File size:1'896'960 bytes
First seen:2025-08-04 08:42:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'656 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 24576:xAwh57di9uvDh9t/16jQDIXUq09DUy4zSVGHWuj4LH2uICYivdV+Oh7Ur1L:U9uvDh9ejQDSXy0TuYi0L
TLSH T1C7958E07FB8687B2C2641777C9AB091CD364E7827713DE5E3D8A2B5A1CC37BA9941207
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter abuse_ch
Tags:exe FormBook HSBC

Intelligence


File Origin
# of uploads :
1
# of downloads :
53
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
HSBC Payment Advice 04082025-PDF.exe
Verdict:
Malicious activity
Analysis date:
2025-08-04 09:02:30 UTC
Tags:
formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint net_reactor obfuscated obfuscated packed packed packer_detected
Verdict:
Malicious
Labled as:
Trojan[Downloader]/MSIL.Seraph
Result
Threat name:
FormBook, PureLog Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected FormBook
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1749707 Sample: HSBC Payment Advice 0408202... Startdate: 04/08/2025 Architecture: WINDOWS Score: 100 26 www.autonomyvirtual.xyz 2->26 28 www.atomicmanager.xyz 2->28 30 13 other IPs or domains 2->30 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected PureLog Stealer 2->48 50 Yara detected FormBook 2->50 54 5 other signatures 2->54 10 HSBC Payment Advice 04082025-PDF.exe 2 2->10         started        signatures3 52 Performs DNS queries to domains with low reputation 28->52 process4 signatures5 56 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->56 13 InstallUtil.exe 10->13         started        process6 signatures7 58 Maps a DLL or memory area into another process 13->58 16 vmxAvxPP.exe 13->16 injected process8 process9 18 wextract.exe 13 16->18         started        signatures10 38 Tries to steal Mail credentials (via file / registry access) 18->38 40 Tries to harvest and steal browser information (history, passwords, etc) 18->40 42 Modifies the context of a thread in another process (thread injection) 18->42 44 3 other signatures 18->44 21 rO9XDxR2viyZfn.exe 18->21 injected 24 firefox.exe 18->24         started        process11 dnsIp12 32 www.atomicmanager.xyz 76.223.54.146, 49701, 49702, 49703 AMAZON-02US United States 21->32 34 ukinky.shop 195.110.124.133, 49709, 49710, 49711 REGISTER-ASIT Italy 21->34 36 4 other IPs or domains 21->36
Verdict:
Malware
YARA:
12 match(es)
Tags:
.Net .Net Obfuscator .Net Reactor Executable PE (Portable Executable) SOS: 0.28 Win 32 Exe x86
Threat name:
Win32.Trojan.Swotter
Status:
Malicious
First seen:
2025-08-04 06:23:52 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
16 of 38 (42.11%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Similar samples:
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Formbook payload
Formbook
Formbook family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
cc6c49eaa6a236fd76d53aa8a92741e21270f7c3fdf87f54848d2076e0d1fcdb
MD5 hash:
6eaa48487ed8cc8291818568acec2412
SHA1 hash:
4d1f0d2dc5ffe6d2e0d12b806e6bc2ff34d86db8
SH256 hash:
bcc64f0f8262e948c23b3b72d9482a14f804872562ec7f1a45cbb456537e3cdd
MD5 hash:
c1548467ce06264da3fd34851cc19a1a
SHA1 hash:
08691d7257f6aa2ab3fd15125513bd88c21e1da0
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
33c6cdf68c69fb67c8e2de830a004b1ebe7e0b9e1b46ea088348482ecb76a2bd
MD5 hash:
a8b305ffdf500d6f4c576975df22d6b9
SHA1 hash:
5b65ff5b5950c3b8382558442622193560e12adf
SH256 hash:
889835d5508484f95c252d4110fd6e14e8149dff35ad4a0c9eb7cfd08a78b1f8
MD5 hash:
9d85aa79c85a110d18c6edc06af89980
SHA1 hash:
96ef239b9b35e57c8c0698fbf908cc03c38f666c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Formbook
Author:kevoreilly
Description:Formbook Payload
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments