Behavioral task
behavioral1
Sample
980-64-0x0000000000400000-0x000000000042D000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
980-64-0x0000000000400000-0x000000000042D000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
980-64-0x0000000000400000-0x000000000042D000-memory.dmp
-
Size
180KB
-
MD5
decd57d87f77b09904682f7109cb9077
-
SHA1
8299df5f6baeb361c293e8b406d9129df183234b
-
SHA256
8f93769b09b34a517161c410a9ebf29f2ab6c51e0d39258d24b95eae468f4f97
-
SHA512
efa25850aa34197e5589f0c3e8fc32cddec236a3d45e3e9e02eff1fcaa3bb0b499c01ea572e9cd354f0258b23fb282bae92770aa0e52d8e2710f2876c821d1b0
-
SSDEEP
3072:4V1qDIYCidvJkyPDRXW7v9lpYPTeZTBltRf4mcM7b955F0zdZZcT3D5J961:6ZclJ1DRG9j8KvltRfXudZYzU
Malware Config
Extracted
formbook
r62p
JX34hx7oILkUXeA=
DWHEXhlHGUB7
0CaF/9hfMF4USszVxj77HUI=
8lXANaDIe44MKlhPHLaNq7luRjguwsQ=
WrgrpXfzuuB/uqw1qg==
EYl+jvQnumh9pTMQ3mCXeCaurGIkXPo/Hg==
HU+hIYrEbhFEmjSTR2cvk/PGWwhO
f8c108puUAbdLHjc
oQhzBnqcbjhVXYbVh1pdJ8F3wMZrnfkv
bc2s3gRuWHJ5xGB4fIQ5
GnM/d9vqrnld4U7F
yyGR1LVHGUB7
qxEaK4iuQNivJ6UmEuA7
BVIyU2gX5Hx1tQzil/dtmSrVX9k+aw==
yiuSJhLMsdJxyj5G4nkmbRKJmg==
wwnSCIWyaoUcattfSWVgo3IG
3SoVKJDIgyUmMmR0eXMq
AmRAWu4nDh0gY87JpkjlTJxGkg==
gdZN3VaIQOOuboUmctg7
tQxl461Ibd9zISFNDD8=
iuRA4sZmPGd81CFNDD8=
eezf+QGgZDn2RMSh8uKfAv21CPhyXPo/Hg==
DHbwhoAwwY1GSXv9pfGRvQ==
xvqwS9AgRSzn/zrN
shKCEPihLup3b5oOvzonF0E=
ac0Vs5pC4Ekoaus=
/FrEXzbQWyF7vwbaog==
7EE4M3uNDt/dLHjc
uiIVNJ6TPlqA2SFNDD8=
0A56DJ3IWfXw7SZYeIEz
7jagNcn0lCAcLCFNDD8=
HX9bfeXHr1R1
6k6cNCTj0OeBuqw1qg==
h/b2Osz+tNZPjb08qA==
syeJGwbAeh6s3CFNDD8=
bc8wz16JWoQKXcw7JHokZ1U=
GI3GeZwU2cV9629Rn8uA9cTpPvlM
rMdWuYVTIsDm2AZjtA==
vh/sESC7dkgSDzMihFJQa3VzPbDWwsY=
Go1udFrC+63Irg==
HnbtakblILkUXeA=
4RZpBwChCMZ6uqw1qg==
Oo4KqygXgdTvuvtVtw==
lQT5E4yvmqen5zwW1mVCK7VPkA==
1UwrU3StdqK7vxNzP04PcBXpPvlM
eOTYDWyBCNoJDlKscnBgo3IG
cJWYvPYZRSzn/zrN
dckxx7FiKAFFi/k=
1hYNKZXGWAosQGy1c3Fgo3IG
4yV66bVL1KZcaUHHIuDXtA==
8ki/b3wqRSzn/zrN
u/PQuX+gLtDAGqCy3tzE8qAf
yC0OQGWZQlM=
1K7zn8ZE9z66uQ==
DV7ObPw07bC0736csGjCKTMO
zC+OOQ+SKfqauvnXxz77HUI=
RY2qa0Z/fkZs
fsm6y+wVS7xHByFNDD8=
jGdDeNblB6hHxqHo1iY=
yhyORkDimsr2+CoHwj77HUI=
SaiLj/nuATNd4U7F
RJD4WVUE9z66uQ==
+g5NXqF3hFJ0
BV+/XHgGoGWI4X6csGjCKTMO
clustersquads.info
Signatures
-
Formbook family
Files
-
980-64-0x0000000000400000-0x000000000042D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ