MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f874095f50064aa4f4405f045c8ca3640812609167138cd7137816cb8f774994. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Formbook
Vendor detections: 17
| SHA256 hash: | f874095f50064aa4f4405f045c8ca3640812609167138cd7137816cb8f774994 |
|---|---|
| SHA3-384 hash: | 782a0c6ff000a09c2595380a0b8e70d7f3ea13ceb36f420dfab8e42bd73900706c78857a8f6f0e142a1fb32a43a90e25 |
| SHA1 hash: | 0d936045cbd1abf3ef03a06d2bb399dd987db78e |
| MD5 hash: | 55ce2f9966cbe4f997c6a09dd4727fea |
| humanhash: | illinois-wisconsin-shade-moon |
| File name: | Documents.exe |
| Download: | download sample |
| Signature | Formbook |
| File size: | 620'544 bytes |
| First seen: | 2023-05-01 00:00:48 UTC |
| Last seen: | 2023-05-13 22:49:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:8R6RreKqnAo2tPiGUgG2rKhecEtz7fjHqLlNhHqVnM:5rqnuCeP7zqD5m |
| Threatray | 2'726 similar samples on MalwareBazaar |
| TLSH | T1EFD48C3D19BD5637C17AC3B98BE49823F1509C6F7121EEA968C333A64753A4275C322E |
| TrID | 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 11.2% (.SCR) Windows screen saver (13097/50/3) 9.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe FormBook |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_Formbook |
|---|---|
| Author: | @malgamy12 |
| Rule name: | Windows_Trojan_Formbook_1112e116 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_formbook_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.formbook. |
| Rule name: | win_formbook_w0 |
|---|---|
| Author: | @malgamy12 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.