General

  • Target

    2020-72-0x00000000000E0000-0x000000000010F000-memory.dmp

  • Size

    188KB

  • MD5

    195de6de9e1ec74e4ef00a465ef77803

  • SHA1

    5645cf2b9158e2446a2622eda2a2a983a45fb140

  • SHA256

    5114097c65394412124348a24c8c8003e8b2199bf2659b2a3bcbf0dede621575

  • SHA512

    a968f8150f0619192691f360fd77b0b8420c2ea564550a9e3ba5758171d82c3f6a5f1e685f251ea05918c64d8cc3495b3c9eb5bf57df96f68f99ec66169341bf

  • SSDEEP

    3072:lic/UEW5iMKhb3yAPZQUTLAjqqAtT2ORCCHt399vXfKctrE/F3Q:lNAozyaiUHgqqAt7VpHvXnw3

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

et02

Decoy

floppa.art

mdesign.solutions

rus8.top

pleasantvilleenclave.com

schweitzervacation.rentals

yaolibeautyme.com

the20-sa.com

hifuel.info

meadowsweetwater.com

squamouscellcarcinoma.site

buildingblmt.com

saberfund.online

letyourstorytalk.com

neinagordon.com

turing.buzz

bouldercityhandyman.net

gethub.online

404wellesleycourt.com

squezpop.com

doublesranch.net

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 2020-72-0x00000000000E0000-0x000000000010F000-memory.dmp