General

  • Target

    1972-63-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    add905455fc8896bd87f4af9d39e4a45

  • SHA1

    2c423b38cac4f4e8213e359ab55071b50a6cddcd

  • SHA256

    7179b0abf67dd5850b7ae92f93f542c01370f6255ba78860eca44f3a5ff79303

  • SHA512

    4036f822e54346d2ea2ff2c0c32f355512713c66aecd54be2f250cea756d88478dea298ce797bea2269e2dceb75a9f6c21ced8a1a11995a603c9b8cbe0a06910

  • SSDEEP

    3072:xO3aqFrfLbrXEfvNofIcwXhGvlUJUbsdliqpyct+OtTsy9YXoiV8:MakLe8IcihUbsdlscUIsy9yrW

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ndgi

Decoy

vuicotvxrejp3il.xyz

w3fa6.net

sappuno02.com

konstruksirumah.xyz

usalifehealth.com

and1f.xyz

atenmentfstinfdow.beauty

primepipe.net

roundhouseny.com

alexandermcqueen.icu

transporteavalos.com

spankmetaverse.xyz

jhccowholesale.com

bielefeldgebaeudereinigung.com

saintraphaelschool.com

larifaa.online

dejabrew.info

izabelaeraphael.com

granniestoneet.com

greensourceseed.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 1972-63-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections