MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 db2b7020233579fb99689c7e706545b2d7eefa8a83ef24160831c8fc982a1b4c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 16
| SHA256 hash: | db2b7020233579fb99689c7e706545b2d7eefa8a83ef24160831c8fc982a1b4c |
|---|---|
| SHA3-384 hash: | 430d1c8cf5a692406537ef53e792f25c724f9c62edcf7395f962af2ff89dbb30f748874d7b1dc98041977a62220ccb2f |
| SHA1 hash: | 53933129c3f7089a14a7d6064830166396a191a9 |
| MD5 hash: | 89639ca126abaab1152896a3decacf3b |
| humanhash: | don-washington-blossom-uranus |
| File name: | db2b7020233579fb99689c7e706545b2d7eefa8a83ef24160831c8fc982a1b4c |
| Download: | download sample |
| Signature | Formbook |
| File size: | 744'960 bytes |
| First seen: | 2025-09-05 12:37:55 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 12288:ntPfqXuQcVbXCkyV72pqk+VR5FLkqXWeMYDOhmogP5npCSItLOwUNuugL:nteuRbYd2p/+nrLkMWdYUgPnCSItBtrL |
| TLSH | T131F412802755DA17C1B107F46D71CBB827B91E8E2811C31B8EFABCDF7E723556A81286 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
1de83b987288b4280bc4b6fad76085039e6331176c878c6c6f0987ac130f9bfb
0840f45762bf300b246de1ffad9e7bf88553e161ec6d4792c717e313953fd4dc
a32fd19d8316aba5a942b60b7b642ef2aaf33b9e5e731f107f7e6087655c8130
5d023b0f2a0157dd7926b0916e5f97a313c7e2483fd3fb37bf832f14e7447124
e12b5b829cc5821f7f99f9dd8a11d22da157eb3259b29c40a8ea61acdd3be4b0
510c29a71ef80977585b1e7668fedae30a6763287ff352f9a089089ed3330d80
649705cb425bf5f1054b77e1608de06939b75e8d45ce09ef1b2dfdbc915711cb
e987424c875d55c8546dc30074cfd2a2198e2ee04ef33bfcc5064a8918a7fab4
fe2ffc367b1dc62198c5b5f8d4a6d6548b69e23d6e4fc1512e6670b559ef722c
72bdc7995e2495a57c641008e106bf7f7abf81a75259d46f6f7567c027f8626b
0b303e9042652deb176df0601228b63fc49854af5a54c3fbb2aa1715930d537e
8283ef61043cd67542616a9d39a99c94e5e03563078dc746d32f7e719c5bc8cf
f63101d19ea6db33f5cae1fe3609805e0c9daa02b6e948465ce674e2c89df8f2
728e559497f67d11db44bee08e80408e40612f122a096e55e5923b59976f82f2
745fa2ad40de39e3a4e6d27d26099cd2d6158dfc96950bac409e6aa508a2b87b
e8aca4e1f2ffcf057520ce168019a1dec87de4593a181817231284f29b0b1f64
df580b5d352c69b34f31f9a12c9af7f7d0ca4894ae33acd7286b9b4cc2635e23
db2b7020233579fb99689c7e706545b2d7eefa8a83ef24160831c8fc982a1b4c
837b7c72e06fc3e364b269d3e3e962370b670dd743856e7916b5cd27dc5b9901
6e4a9e4a5b9037b947b2b92247866e43d15561d66fc53fe1d629aa23560644b5
3b8313decdeb72e5bc04326dcb9cedf06c1bcce618e5f65d84fe5f481f9af3c0
241d00dc87b5c01600a761460116e618505ecb4263f586ef5447b8c1d4329ebd
078cabe3f98bbf49468d898d869cd8f58df0ff0a1bddd9d00524ac49dd04f3af
cd96ca7a5b5ea72b4c03e9b2363296307ea826dc504c2dd54df89c3aeae94d5d
db2b7020233579fb99689c7e706545b2d7eefa8a83ef24160831c8fc982a1b4c
c5658d0585c94a50f715384ed28507806352107648eafa58fd7764a16c382244
fea19e2a8ec0ae79fb6f25deec6ac647a53027ee3d4861be780daf205d49a718
53b1100f0b09af2d37c8df2bcd77aaf844c4424bf17d71854a5d14130881ba10
3f3bedd484f8e49e35bd9e77b1ae88b27d5efc747a44dee28277be0556653ecb
62f63b180fc726bb6d54ecba4b3edb4436e2442953b07aea87c0e60cf057417f
9bcb3e63dbaaaccc6ed10bde4e8f96b264947758d1bf27d143b37f3f29166a84
6baa5a857ac8045ba485189e5098242a01946a00e35a7a541d7494562137aef1
5ee3dca8cae3f74a8d15e487328d1a33c28ca7098c747f2d50e4e5547d038474
928f36967f7a7af841021d4833479ec18178d48d9c418e772d0b3d32da7a2e6d
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.