MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f6a7d7226f3d531bd2470eead967b606744105b3e68d50bc8665db0697664651. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 14
| SHA256 hash: | f6a7d7226f3d531bd2470eead967b606744105b3e68d50bc8665db0697664651 |
|---|---|
| SHA3-384 hash: | f4a5a414c62ba5135f9a8a51a41200de2fe179d2c1120dfafdbf358379ad2cbb73431d2eb4b3a575897b2be21a2c37c9 |
| SHA1 hash: | 48c55ba10aeec1cdedb2a77d2f0f0cdb4961a9da |
| MD5 hash: | a7f5d85e8b2ff9c014216c65ca205f84 |
| humanhash: | sad-magazine-alpha-table |
| File name: | win.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 545'792 bytes |
| First seen: | 2021-11-30 12:25:23 UTC |
| Last seen: | 2021-11-30 13:32:14 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:jzqILZaHyFLVW+LLCFcqrVztN02klkUM19Uiqrmd:PvLZaHyK+vCFcqhztN02kRMc7rmd |
| Threatray | 11'813 similar samples on MalwareBazaar |
| TLSH | T1FAC4023A53BC1A15C9BE677DB43441105B39A217A047E74E738E68EA2FD3383C91276B |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
9d542cbd5402390cff627ff88158b1aada6d9f00a8444fcfd321e91385e94f15
3d98af517d49b15dba615482257fd8a72f8810b0d4f18a47fce8bf06b3372fa9
43d225f01bf64527f716a45d052721613242eace99774e3ff5567839540047f8
a95c61dfc2636d3b7420f5f22216bc5cd579aebc88285f81b7f63eeae91c18d9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
| Rule name: | pe_imphash |
|---|
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.