General

  • Target

    932-64-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    34163c00585cd5f71a1d333866f4499b

  • SHA1

    c800eaefb60dea1d6254c46a108e22f8a6f68d0d

  • SHA256

    b3f2905acaaecaaa857ccb50579c01ab4132e8edcba5a49aec3eb5890b250133

  • SHA512

    a29c8942d63004e80e38b8a1e0e6f52a5a8c2ffc3ad85ab5b0c666ddfc30e0597721652bce4556181e44d1377c7e1df551ae60e4bfc7ca6606ca407998ac7caa

  • SSDEEP

    3072:z2MvBkKF1wvzJ93ikcMZ9Xa26zNUCsMdEJjuSOVqRgcanfv1tfGHo06nBIw:nmxilMZta26zmCVVEZGGI067

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wh23

Decoy

ow9vyvfee.com

alvis.one

mutantgobz.claims

plynofon.com

southofkingst.store

nuvidamedspa.com

coffeeforyou56.com

opaletechevents.com

momobar.life

abcmousu.com

learnicd-11.com

tipokin.xyz

kahvezevki.com

suratdimond.com

oldartists.best

infoepic.info

mattresslabo.com

skarlmotors.com

cl9319x.xyz

med49app.net

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 932-64-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections