Behavioral task
behavioral1
Sample
2020-67-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2020-67-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
2020-67-0x0000000000400000-0x000000000042F000-memory.dmp
-
Size
188KB
-
MD5
e32f0a39ab79f427b66af7e70911d4d6
-
SHA1
1fb087ea07ed310108afd2588b7f2c237b609fad
-
SHA256
8390e1af1aede37499f77a317750ba027435e8c48aca879ad6f9a16597016400
-
SHA512
b4118acc0c7f7d8dc23334a2ea477cc83f93b9e64b33dc2cf80c025cbc8169d9722bce0a277769589a70dea26bf221ebb0ffc6f6395452c0b8dd98cdd74edb4e
-
SSDEEP
3072:tESeES4Y6suhWhoNDttWnNyW6LgPXkXuFudRYjMh332wJBFO+rm8t8BJVe:iSeEsqh4KDtSesf4ukdRYgh33rJC+rmC
Malware Config
Extracted
formbook
q643
1tn9LBYX508=
6qWII0XHmv+lNyvR
R8WfbLtHJvW+tmucc+2hUQ==
Z0cmsc5RIYPksC8ggtXb
XONt9QuFXNxOA4irc+2hUQ==
j/vbmOvrTrilNyvR
cfVVi8gvD0JYK60=
sDN/wM2tjkD6vjNx8A==
eEVUFkXLnP+lNyvR
IzxjubiUdbZ3abo=
be1UmPOskWIeVtv0jLrdfxehvdDQ
0LkYKWfnuKZmcEDWUirKiRfm
NvXdZdGBJD/49Q==
cPtuo8lJJnMwxm+gc+2hUQ==
/eTTXHXrwDecauwZPU3KiRfm
bzK1EX81DA8DxLXl+A==
bjrRJYg/F/ijNSWIWD0=
8MUrGHlAInXATwArxBx1U28=
t4XP8Vsg9+vT2Y7Avsdn3DNYyw==
4bdSqRDBkGOua+sNj98HIwSbBQ0=
tHuHVaRBDE+CjEd36xx1U28=
uUug1BnGlVirX944grjR
0GfufeKDWFcpA/efnrdJidSWFxQ=
pT3TZYH6zzPp9+jVUjs=
fASdK0/xyxzi77YggtXb
+q8reY13WEy8iWtc2dPM
zZkYdcdYL9FbDouxZLDZdRKhvdDQ
nlvoPYtV8/ZmJujVUjs=
3JHh/S+UbdSskoIp2hx1U28=
oys0N6EsDvntH+jVUjs=
ZPbhpwGYdPSlNyvR
y0dPYYAB1xTYeEFjETM=
8K+C8GU/F+mytm+cc+2hUQ==
JhPyZXHuwS7s+ejVUjs=
tnOCWbd5SJdXJejVUjs=
pyy7PU/Oq3cx9XCMsgLBe4qkv9d/Ql9U
+soRJ5mFXuRI0tAqUCw=
1KmJG0S6hvW2jP0VvursgxahvdDQ
cTvnNb+teN8v8X6cc+2hUQ==
65br+iSle8WUemdc2dPM
aNSrdPXDo/tO3NxDY8TZ
iU0n9ehlN6BkdITh8RE8WQ==
9LXtMbV/JD/49Q==
agdjwDzlxL0p8qiQHCI=
xF91hAvXvQrIzNAqUCw=
WScPfPnJrYdKXRY+XIk2CSE3av6oWg==
Z/XcswiffUQK0kV/drDZdRKhvdDQ
qGWxwASleE0GxLXl+A==
wFDoZ9yPbF7VWB6v7w==
lhNquPpdPr636dZ7nv4blzQqOsR0Qg==
MRn4h7AvCIkldinG
igRNmhTryKt5ejNgjrpPEic6av6oWg==
5ml1fvC3hM/SVMnwk8rneQ+hvdDQ
hDEcpyUG00m+ffSJQKa/J8w9gMbJ
CDZPY1L73Uw=
9s/YtSPZrfNAyoc3N2or1W8jvwwnUg==
v3wNZcp4WUECDM1n9Rx1U28=
5HMIkRbgyb8nu2ugc+2hUQ==
s04Y62c2EkJYK60=
5cIjRH3yw7oe2GfKOEIIgxbu
8ptyN5laPZn8tC9miJxOET2WAEPIpJM=
1Wf4jKsz925HEInFaIQ7Fvm9hAXaZHhc
J+l3wSPTpbQ5x4Qzc+2hUQ==
liB5E0rukCPy8KU=
saktiberinternet69.site
Signatures
-
Formbook family
Files
-
2020-67-0x0000000000400000-0x000000000042F000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ