MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e33cb23b65d7b1b744b2e12f438cf192f2c58431a4e7f42c7c99899dbaf06dad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: e33cb23b65d7b1b744b2e12f438cf192f2c58431a4e7f42c7c99899dbaf06dad
SHA3-384 hash: 17270f04e63929dd69f354344586f59c18dbc7ae6920a852cb7ca00f2a86252186fb75d90d1ffbb7301a4c02451ead31
SHA1 hash: 8ead3d9f7d8fce33975ba0e4584a3d51ebf48a18
MD5 hash: b7a8887b2a74dfa33402f01115c72f8e
humanhash: twelve-mountain-bluebird-lithium
File name:e33cb23b65d7b1b744b2e12f438cf192f2c58431a4e7f42c7c99899dbaf06dad
Download: download sample
Signature Formbook
File size:758'784 bytes
First seen:2025-12-08 14:56:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'749 x AgentTesla, 19'653 x Formbook, 12'246 x SnakeKeylogger)
ssdeep 12288:URfoSbg3ltFImKLTtTkknl79Q5G6HT6uujEYaBSTPWxzeIa17h4qHxq00SB2bKy5:URg3lvbKvtLh9d6zHujEV6cVa17ZRq0e
Threatray 2'217 similar samples on MalwareBazaar
TLSH T1FBF4239FEA469861C23A4F77C017925840A6E8E1FD73D6AE06E74D650EF5B8CC04EC8D
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter adrian__luca
Tags:exe FormBook

Intelligence


File Origin
# of uploads :
1
# of downloads :
70
Origin country :
HU HU
Vendor Threat Intelligence
Malware configuration found for:
DeepSea
Details
DeepSea
DeepSea decrypted strings
Malware family:
n/a
ID:
1
File name:
e33cb23b65d7b1b744b2e12f438cf192f2c58431a4e7f42c7c99899dbaf06dad
Verdict:
No threats detected
Analysis date:
2025-12-08 18:29:39 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
shell virus msil
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed
Verdict:
Malicious
Labled as:
MSIL/GenKryptik_AGeneric.BRC trojan
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-13T01:04:00Z UTC
Last seen:
2025-12-05T05:31:00Z UTC
Hits:
~1000
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PE (Portable Executable) PE File Layout SOS: 0.36 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2025-11-13 03:56:33 UTC
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook discovery execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Unpacked files
SH256 hash:
f44a97ba959a2f1b2154d69c4d118fd16bc5608f7f1dcf4f36bd44c6543b3b9a
MD5 hash:
64a9dd1563f828735d8bb70617bd4d5a
SHA1 hash:
85cfa4ff543dc85b7c8247876c9a8bee99cd9091
SH256 hash:
d5f2287d47afd6b39997afec563bb619af967e25bd2a1495e0e07afb525ae01e
MD5 hash:
2832ecaee296036a0a842300274d8887
SHA1 hash:
aa5f4133197145237c8366d82ba78052ca571274
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
f807ca17f2d453195f174a19bdaa6b2555bd311703196f92c188e23745752da0
MD5 hash:
b0dc1c834fd3ec0428112a9258f40a17
SHA1 hash:
e5d20e42b786ea57795c97ac0fa2ebf9d9d3395c
SH256 hash:
5756d9750dfea95e1a04b78de642203c7f3ac10c114679dc26fe963331fd0090
MD5 hash:
92dbf90453c4a0ad9ff72dfe4942e5da
SHA1 hash:
6b6538681f4c2f420382cb653e115f22f104ad07
SH256 hash:
e33cb23b65d7b1b744b2e12f438cf192f2c58431a4e7f42c7c99899dbaf06dad
MD5 hash:
b7a8887b2a74dfa33402f01115c72f8e
SHA1 hash:
8ead3d9f7d8fce33975ba0e4584a3d51ebf48a18
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments