Behavioral task
behavioral1
Sample
3852-143-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3852-143-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3852-143-0x0000000000400000-0x000000000042F000-memory.dmp
-
Size
188KB
-
MD5
a43ce6dd3949700d9e17076ead2ca099
-
SHA1
7dc77324063edfec1078781f6713abc9d5927930
-
SHA256
4f930ef102660890b1bc0d7f1ebedc219325728061b375e8fc01717d639b0d6f
-
SHA512
b7fb7b05ebb43ef19085216fb806bfaf598e1ffa0a7b1426039243cd51b82d72dad90b169bea89b95a2fdda552354afb641b1f02cc67acea1dfbd9663e8de59f
-
SSDEEP
3072:+f/nSzEk+4b1NWMZ1piqezNENo0loom6zAYDnuhG4XFHiU5g1KmoZ:+fqIPi1xvapE2co99YDnuhGYZiU6oZZ
Malware Config
Extracted
formbook
q40s
/FzVDUVog/Ss7BWgAuaV
NytWkzKLhspg53aTpQAKV/+xaW4=
jS3qIC1isoE=
4rnA8oi5Ob+P
Fn4SOGOIpgXDBRH4Q37flw==
DmLY7Bh/n5zWDJoXTsWoMUU=
rSG25fYwS7KE/e4WNI8=
dtRzlXnjBvNFgAZ9uSntV1I=
PydhjxWAn+aCAYtk6yntV1I=
0ym49ilQV3//f/vyCKsj6s7HcvIOIQ==
MLllrrfpN+tCyA==
Vsdcn74ecHDCM8LV7XbWwkg7qQ==
LP4sWRzxWNGW
y8jvJH/k9es/v2mfsyntV1I=
b8ZehUN2jE1HtrAlSG9hns6WK+ANKQ==
61jqC2TIAXo6iNLrQ37flw==
ZNpsn8g5crU/vlhkikjNwkg7qQ==
27SouWqYy8P6QPqJ/9WVgA==
8cD4/veDw2txqk2ktyntV1I=
A2oiVOxMpmR5+AS86rmcZxDN
M0BaeCd+p1ta4R+gAuaV
RT5dYe4ZLAaPlTXo
Sz5HiQcsSvADkZcAKpTDMTa0cDvuS6M=
gHSKsmy8xT4ALyXvJiQOV/+xaW4=
YNuG3+E8WBQUiEodYpg=
7EnaAPAkTX8NMO4WNI8=
UEZujMwqVlOkGJaUunQO5cTCcvIOIQ==
tg2Uyf4qVtWf4wPY8ricZxDN
h/yFiG7K7LXUx6sqMgOd
8Nb4FoDa/zvGVe34Q37flw==
kO13iLAYKQ2PlTXo
BGwNPky43J+RCjG7xa+cZxDN
v7jO5ozuIKR8/+4WNI8=
ZFJMlBDxWNGW
BGDxQ9LxWNGW
Y1J2hCCFsKN5qk2ktyntV1I=
QSs7Yx3xWNGW
pgyWuKsAE8e7JzigAuaV
1UreHlDA8C7EEfUHFg==
yKjT9om9xnun2xHm
LqL2a8AwU46N2ng=
pw+asfgkQsKSCCygAuaV
wKuxyVuMlirxWmcFP05XNPYq48GMt6s=
Gow3TECm7t0UfAT5Q37flw==
00bkJmzeH1/5evsKShWmcU479fwBUp3C3g==
/4gxXiJhhW2tt608c5o=
/XIHUJvP7lhTPj//
nCTJ6MAZOKx48iOgAuaV
bbdsBczlaOSc
ZVBdhhCAw0tTPj//
T0hhlwUqQ8Wl1EodYpg=
2cTrPCF4lw==
4zUUWaW6wII=
g9xjcWaGt2mv6Qvi
HxY6Xb8nT6t+q0+91vHW+a0uQxro
nvqbprwhTFSq8YEQPC3n/awuQxro
eeh0ngZ48k/TpEodYpg=
n/6KkmyjsJ/eEfUHFg==
61bO/N5BcOu3L10jKc5KKzouQxro
d+iKt8UpPtGTlebqFA==
WzpKkBhdjT9TTVYBAQ==
ySS328jsalye3UodYpg=
uRzE4/M+qaKCtmU=
ZGhpkU5/lFVKjqKy8J5e0XV5xGY=
nu7kgy.com
Signatures
-
Formbook family
Files
-
3852-143-0x0000000000400000-0x000000000042F000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ