MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff8546c70bd0c5c92117b5e453c417a85d7dd43bc170d5479ffb8d3f398ee494. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: ff8546c70bd0c5c92117b5e453c417a85d7dd43bc170d5479ffb8d3f398ee494
SHA3-384 hash: ceef0d709a2fd771659b72ce89b21860ae0ca2186c328c07cd445d8bda2f31e8fa8c55f0474edeff007f953113fcb86e
SHA1 hash: ff11652fa5e2380a091a9069f2bbb570b0c9d8ec
MD5 hash: 4db5e988eb7a9d1eb1816b1a258838d2
humanhash: connecticut-freddie-vermont-bakerloo
File name:license.js
Download: download sample
Signature Formbook
File size:67'994 bytes
First seen:2026-04-01 04:35:04 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:aiyExHxmoaI2E9F/f205ZH/vK6AZ4oJcp+oMNHe7vTwxstNRBhREmwoLnwa8Ev0G:OlCgy22Kfud4dDAV
Threatray 2'673 similar samples on MalwareBazaar
TLSH T1F963E2FDAF5DC4F51433ACCB7C706AA04787D92963E06DC1E666669D89832238460CFB
Magika javascript
Reporter JAMESWT_WT
Tags:FormBook js NKFZ5966PURCHASE Spam-ITA

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Verdict:
Malicious
Score:
90.2%
Tags:
ransomware extens xtreme
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 exploit fingerprint formbook repaired
Verdict:
Malicious
Labled as:
SVM:TrojanDownloader/JS.MalBehav.gen
Verdict:
Malicious
File Type:
js
First seen:
2026-03-31T22:06:00Z UTC
Last seen:
2026-04-02T02:35:00Z UTC
Hits:
~1000
Gathering data
Result
Malware family:
n/a
Score:
  10/10
Tags:
defense_evasion execution persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
System Binary Proxy Execution: Rundll32
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments