General

  • Target

    520-67-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    d1a7df3ca6fd82f657b8d6413de20457

  • SHA1

    411d3fc10e96d9f5d339c19fcadad7861308d11a

  • SHA256

    8361ca7f4561da27b79ca9d44a4248b9d7665db418864ec37dcf001d2970cc34

  • SHA512

    667fccb2588a1bd089857679e32259fd8f65f5ea24eb67aa8148aea7897f70b5556bdd0ab3728e2f787dc727a39f5082a64c55962e7d972b8eaf7673008c8cd5

  • SSDEEP

    3072:tZECkiUDv5+ce13QjfIRqhGd18IF3nlIY80fBKAyz+JNVjM6y04:5XZQ7eqhGd18+IS/

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

oi05

Decoy

fluidavail.online

blchain.tech

kyocera.website

sangmine.xyz

thepolicyjacket.info

ssvhelpman.net

y-t-design.com

eminentabroad.com

codingcamp.store

bester.capital

tanjiya23.site

bheniamyn.dev

top5monitor.com

bit-prim.trade

airstreamsocialclub.com

darkwarspod.com

zazisalesdistribution.com

vivolentlo.online

daftburo.net

elemangelsin.xyz

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 520-67-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections