MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e17e39d20c194119049acc304dcc9d183f6a6fc42026db415f71c6c6eb77a2b0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: e17e39d20c194119049acc304dcc9d183f6a6fc42026db415f71c6c6eb77a2b0
SHA3-384 hash: d0c59ead7880200c7611139c02f17161bbace9d3e0b37b636eba2a240c6f79bc31ed209067d3dcf43a899c938d4a93e3
SHA1 hash: 4919c744d301ee5e415b266a2d6e960c1e6a7027
MD5 hash: 7c6c99813787ee6b222fd613639eb959
humanhash: echo-iowa-illinois-nuts
File name:SCB 3668696365-006YTS76.JS
Download: download sample
Signature Formbook
File size:4'598'476 bytes
First seen:2026-04-07 10:25:46 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 98304:eFqPHvfkGyp9CAgwXWjesfq6s3v/QjCv/WiOmYWADYgLF225vzAM7brCGkcuf01C:eFyPfpyT90XI/QjC/TOmNADfJb5MYbr2
Threatray 2'791 similar samples on MalwareBazaar
TLSH T10026188023E01CEB4B635F94E275A7C6BDD758F768A9D436F15E4DE2E0B48049B31EA0
Magika javascript
Reporter JoulK
Tags:FormBook js

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
QA QA
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
96.5%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
File Type:
js
First seen:
2026-03-11T03:36:00Z UTC
Last seen:
2026-04-08T15:27:00Z UTC
Hits:
~10000
Detections:
Trojan-Downloader.MSIL.Seraph.d Trojan-Downloader.JS.SLoad.sb PDM:Trojan.Win32.Generic HEUR:Trojan.Win32.Agentb.gen HEUR:Trojan-Downloader.Script.Generic Trojan.MSIL.Miner.sb Trojan.JS.SAgent.sb Trojan-Downloader.MSIL.Agent.c HEUR:Trojan.PowerShell.Tesre.sb HEUR:Trojan.Script.Generic Trojan.MSIL.Crypt.sb
Gathering data
Threat name:
Win32.Trojan.Qwexlafiba
Status:
Malicious
First seen:
2026-03-11 09:21:23 UTC
File Type:
Binary
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Suspicious use of SetThreadContext
Command and Scripting Interpreter: PowerShell
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments