Behavioral task
behavioral1
Sample
1932-64-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1932-64-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1932-64-0x0000000000400000-0x000000000042F000-memory.dmp
-
Size
188KB
-
MD5
082edbcc52449ae8133108868b5244f2
-
SHA1
b39ee3b1fb5c3011851e282debee42aaf9c45c33
-
SHA256
99af233a0baf3b0c620ae3f6435a6a2826914ac932ba79dc082a8524e4061344
-
SHA512
ff1fadd5ed7c12901d1d7283938d637090ec9074019b96853513efed89ca0c1188659239d325157cafbe72cac25a4b3d27cd97fb5f4ecd042b756007cbd50b51
-
SSDEEP
3072:uxuyYB8L1XgB7LHAWO/RLOH2PkcfoPEMqSvDWUUXRVZjbSyS:co21QVLH8/gskg6+SvCXPWy
Malware Config
Extracted
formbook
wzun
+lHaivC8+Q2qkGpVDBxjqyo=
si91B+XvfOZtUQ==
CJU78Sq2r09jjo2uDc4=
cbksq/OPizkkz3ai
Lf90ifZ1eR5DspuLztE=
adeHN3DPAS9hgYO4SGGsmRVckUgQ
M6dcCSytIEhgvYRNzWJPGQ==
vcWKp+c0aNWylxU=
Lh+CcbcGTC94ZvaYutk=
3GwliIJKvdg=
1LmpUN/A5ZOpFLgXWh4e
XF0QOl9axutadwg=
CngzK5DcD8NjUidM3UBWDg==
aOCgV6R1oUtp4qrOJN0WSt4GJ6cvr5k1
iZcK8SlAfOZtUQ==
DsH5mTFHTSVuYwE=
8GEW0PJs0/wVazKNvM0hHjxj
E0dE5QWDARemDZeq
tptadbze1H4TtMTeLA==
YHHmzwM7YL5bPN8YOw==
TTPjGTomF813ZjqRmjlPDA==
Lf+EqjWg2fcJ6pTwtn/UGOghD48Y
Ds+KuUvV3TeG7Y+q
MhORt0rkV4q5GNx0rMgMWQZckUgQ
4+1pgvRkqQkVeQEs5A1iS8gGJ6cvr5k1
sIQ8oyMOLO4JaS9NtmlUPlZ9bOFe7Jx3rw==
wZVQgWadk1Pn
FHDnXaRHROj+XQIjomV8efGDnNhbjw==
QdJT7GlCUMNfSA==
JHf1b6x8vm6KALAXWh4e
A4v6c5IL+WGvoRY=
WUYZNVeEw8eiObTbKg==
Oqku1DXvLUrRPuP+WvgVWApckUgQ
zcPI3fvLQOT2
auxlDqC0KkyatYo5JA==
RDrnV9rwXCg/YYeo3UBWDg==
EXc41SL2I7fMPy0HYP4H
/VsOuAWwoEQ/LrY6QnCZjgxckUgQ
KxLDQrmk2Hd/44mW/bSsmRVckUgQ
B4mAEOv0fOZtUQ==
xy/mh71ro79TQha63UBWDg==
ct+df2bm4nuaB7EXWh4e
+lE5ZsoOOemdPN8YOw==
PEL4E2PCD+0zIr5KKg==
S0PzITstLep+Y05nllSrbGav4uYpWja2pw==
hhfPvix0pGHz6O2etar7aSE=
gGsbQ4/fD7FXtqRCcGXqM+12
+YL9pDY5fOZtUQ==
a7X/bcOFtWeM/7AXWh4e
geuRhfRw2Zg+laeC+hZWFw==
hvIxD+7DO+b3
8eOs0fnv/aUzzYYw9J/Yge0+EY0Y
koxNcp2jGVa2Wb/iMQ==
tiUdTq/2O2OJPN8YOw==
sBsX7RRonYHTtBw=
c9qlSWLc4o1aDN4XOw==
q3nsBnz28EWOiwk=
c1dJAJSoGDne1cfQ55rQxaH9Vw==
Z81O7HVYmM9nzlhVuGJwlyVYhD4J
TSmqxmH43XiR/LAXWh4e
YrQ64DkCQFT21JI/PuXgxaH9Vw==
1z/o3Wb275icjBSTtSgpqD4=
Q8eo3XDN/8xsTvyPh3ECcCM=
vK+jSLyop7jZOAypcAQ/Ledy
voltagemarkets.com
Signatures
-
Formbook family
Files
-
1932-64-0x0000000000400000-0x000000000042F000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ