General

  • Target

    848-75-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    c9c1498309973a96e5fc1d034a7d97b8

  • SHA1

    aef7370b82025eab62e72607c0bd6ded3798b623

  • SHA256

    12b924751f7b03ed5b4526b3c0d3d4d0ee95b823ddcccbda56c913be0d74c7c6

  • SHA512

    733dd702216e3919e56e9e2c4b3c044c26cf5a7f0aca2b191c0fe17a77e4dbc295ec2f11496baa5a12a8852cd0603f7fb528d3abb559fc417c95ff275d42d5c2

  • SSDEEP

    3072:z2MvBkKF1wvzJ93ikcMZ9Xa26zNULsMdEJjuSOVqRgcanfv1tfGHo06nBIw:nmxilMZta26zmLVVEZGGI067

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wh23

Decoy

ow9vyvfee.com

alvis.one

mutantgobz.claims

plynofon.com

southofkingst.store

nuvidamedspa.com

coffeeforyou56.com

opaletechevents.com

momobar.life

abcmousu.com

learnicd-11.com

tipokin.xyz

kahvezevki.com

suratdimond.com

oldartists.best

infoepic.info

mattresslabo.com

skarlmotors.com

cl9319x.xyz

med49app.net

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 848-75-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections