General

  • Target

    2044-70-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    6d2433b334d008385b85cedc800e92fb

  • SHA1

    785245650ce995d9b33fa84874d42e808785ce97

  • SHA256

    352d811f8d6ff7033948f23a65b31ac1a940cd15130c5fe3fd163da24df86228

  • SHA512

    27204e8e6867ea6a06f3206f4477fd9c0af3e399b1dc2fe961b971c0c5c9f8aedead0d412de83767804407e9004175d3e5c33c4c82515a7eb8331f16e28f7990

  • SSDEEP

    3072:mQ/pLFyBPQ0oFeTCrt9S4a9rUaH/y942tkW11vTG3kZrRatfD+pl:maJrtYTuaH/y942tkW1N6UrUtipl

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wuha

Decoy

chukou-ryugaku.com

naturatesori.com

qtg166.com

stroma-societal.com

869538.com

i-pays-service.online

crewquality.com

naturaliauruguay.com

robotics6.com

chelzywithaz.com

adlconstruccionesciviles.com

trouvetafibre.com

thefreefamily.com

familysafehidingplace.com

successkogyo.com

cindiwithaneyemd.com

ba4a9r7y5.com

marriagedivorcelawyers.com

dixo.site

tatbakkuruyemis.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 2044-70-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections