General

  • Target

    580-65-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    1931272aae09c3756327bb684cc678cc

  • SHA1

    834d99e70eb72d9c75b9387d103808e3c42a4423

  • SHA256

    a790ad94f7c289a44be7c171616d86d456ea1121c56578cf8f0cb0698566e0ef

  • SHA512

    0d77b2081664060cfae6d68071ad19bf51254928036b0f0af26a6b218c84a4d29036a7fbe4f9caf7d9cc429b9c41095095b7508247271fb452f202a873faf5a9

  • SSDEEP

    3072:lkGpvkIuA/rLk3cxK12P4sav3lgRtLJiW8fWs01LhUyu1TkV6L3hB0:t9Kc412gsav3lgRZkq967NL3

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

jr22

Decoy

941zhe.com

lunarportal.space

xn--osmaniyeiek-t9ab.online

trejoscar.com

nrnursery.com

quizcannot.cfd

seedstockersthailand.com

watsonwindow.com

wjfholdings.com

weziclondon.com

naruot.xyz

yeji.plus

classicmenstore.com

oharatravel.com

therapyplankits.com

keviegreshonpt.com

qdlyner.com

seithupaarungal.com

casinorates.online

8ug4as.icu

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 580-65-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections