General

  • Target

    1476-71-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    ce3c0faad466c07973d90a35fdb90618

  • SHA1

    fabbe955f37d0c4b998ece17dbe78e9538899c1f

  • SHA256

    570542c99e3599f39dbac008f3daab4ea20f97307d81c5a0e84ad797c630e9c8

  • SHA512

    12452d8186ae12823dd15be360f886166e0b4c6daa2101c7d577257ea08452d590fa44a4313c5fc295a5fd8638c196667cae5e4585b056ea9afc731e9aaeb440

  • SSDEEP

    3072:VaeSXpkIR/H/8AO53HJbTWv7TbKmwl3a3bPo6rza8PC+wTE3Fuqbo:OIlHRTY3Kme3a86xsOFuqb

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

u2s7

Decoy

delavazmusic.com

heraluvare.com

corp-reminder.store

tropheesplaco.com

balkandating.net

the8.vip

digital-technology.live

theitpanda.com

macoudigital.com

thefynesse.com

njshenhang.com

shaannkasupe.com

jingpin01.xyz

skofika.space

ereletroatacado.site

amop87mu4.top

impulsevc.net

piojacinto.store

ninevehcapital.com

livedrone.stream

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 1476-71-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections