MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d03d5c962c99335e1ca1701937074be95c015d8f7cf37828c178b35acbd99309. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 18
| SHA256 hash: | d03d5c962c99335e1ca1701937074be95c015d8f7cf37828c178b35acbd99309 |
|---|---|
| SHA3-384 hash: | c5f561d603054e066361fb8ac988e1a0cc69d377503668dba257b48af4b31af14dbff2b8b0db25f7229c37702a4764c3 |
| SHA1 hash: | f223da0c344a7ca0aa002505583719ea04876f0e |
| MD5 hash: | 1db19c71af65de4ff582658b6b056936 |
| humanhash: | zulu-fish-friend-table |
| File name: | d03d5c962c99335e1ca1701937074be95c015d8f7cf37828c178b35acbd99309 |
| Download: | download sample |
| Signature | Formbook |
| File size: | 736'768 bytes |
| First seen: | 2025-11-06 11:18:46 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 21371b611d91188d602926b15db6bd48 (70 x Formbook, 33 x AgentTesla, 20 x RemcosRAT) |
| ssdeep | 12288:cz7hU5I5yuNHIgzSFKxWltRohBfSTso93UWR/53jKNWsrCx/37YUNbnA1ooBkAzG:cf+iN57Gtene3RxzKNWsre37/NbA+SO |
| TLSH | T16BF42345A5C1DAA5C541B370C036CD284A353871AE6A737E436DF66E6C303D3BA72B1E |
| TrID | 39.1% (.EXE) UPX compressed Win32 Executable (27066/9/6) 38.3% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 7.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.5% (.EXE) Win32 Executable (generic) (4504/4/1) 2.9% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook UPX |
UPX packed
This file is packed with UPX. We have therefore unpacked the file. Below is furhter information about the unpacked (de-compressed) file.
| File size (compressed) : | 736'768 bytes |
|---|---|
| File size (de-compressed) : | 1'243'648 bytes |
| Format: | win32/pe |
| Unpacked file: | ea03b1c2d2aa3ec74bf4194c7f623670e13df20b4bfdaae11f2e8604521f77e4 |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__GlobalFlags |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Active |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerHiding__Thread |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | dgaagas |
|---|---|
| Author: | Harshit |
| Description: | Uses certutil.exe to download a file named test.txt |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | pe_detect_tls_callbacks |
|---|
| Rule name: | pe_no_import_table |
|---|---|
| Description: | Detect pe file that no import table |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SEH__vectored |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | TH_Win_ETW_Bypass_2025_CYFARE |
|---|---|
| Author: | CYFARE |
| Description: | Windows ETW Bypass Detection Rule - 2025 |
| Reference: | https://cyfare.net/ |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | upx_largefile |
|---|---|
| Author: | k3nr9 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.