Behavioral task
behavioral1
Sample
4272-139-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4272-139-0x0000000000400000-0x000000000042F000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4272-139-0x0000000000400000-0x000000000042F000-memory.dmp
-
Size
188KB
-
MD5
0f4a7fa6e654b48c0334b8b88410eaed
-
SHA1
dac053a521a1b4e8b962a5b9684a0eb7542334e4
-
SHA256
771c309daff4c2f9dba55684779d769235e2f0e91a549d1abcdfcee9fee6805a
-
SHA512
160ed09e3c90dac0a47fa6caa879a092744aaa72cf531ff6b21da01e2caedf2b5e9aa850b7c58066e3328d9311fa5b87d9a98c6afe5b8ab563caa7f2a26a1918
-
SSDEEP
3072:uVEYH4SSA4VmYFDw6sWyiozXelswMe01aGVmolCW3u5BfoOe5:uFlSpW6sDmsPek/mogWe8Oe
Malware Config
Extracted
formbook
qzxe
+ofy/jc//gxWTSyDsHNe/HH9Fw==
JJPj3RBaNUVMfGjFDYHn4VdZS07u9w==
MDmWp98UG5ik7K4=
Lyqf4GqrrNshqB8Rd2k=
GSZF9fyueK9D
go++PQqY5pik7K4=
TUKqEY7b6Pw157uI
Dm2xsOPllslVpt49Vg1pbw==
PTqi5lNcK5ik7K4=
7MgiQoDCx90vLLPOxru2
Sy+TnscLsgODvA==
d95Jmv8+SFddJyKWA4T92cc=
MJHl2jFE+ySkGFO3CIT92cc=
21nQ5Csz6DBxEMSd
MPVPVojhzO5ErK1evXY=
XUSG1EWdjJ0YiY0nmpLf2M8=
wzmZpONyKVr2QKY=
Jm3IFI7RxANTgTim+w==
XUJnuClAAUnCpSMXW1SaExea
ambAG315NEd5RsOeJaudSsZCQBMrrtr/Lg==
GxR6x0GEeY4Xg7dee6mv
UC2ExkyfoO0t/hCB5h88C2cqqGf39Q==
cnrH3ghEP1toeSyb8Q==
+lXACnh5FjxxEMSd
41Om33B1LlMlOima8w==
374xeesgHWChhPfnYF2ytnilCX4j
qXLHCHqBOECI6i93wDUs59eVPa+SJ3Wj
ThuDlNbVSpzOqQ==
c27AHY/670hDGWHGEN+4
56v9BCFkaq0D/mxmvnGNSsNOqGf39Q==
edxEjgMe3QycGMz8LWqIVbaS
A3ndM5meZ8IGlds+Vg1pbw==
Xr4MEUVMCRVjwGlFmtMLymv8Hw==
59oqdAJDRne9QbKK
vyttwC47+zB6T8z8LWqIVbaS
abv1PLX56RRPIA9urxx5a9HhHYMp
ac8XEVWmpMHOqCUHQkmaExea
VlGk9HuNO0SHrptKV9r53M8=
5r8EXuQoL0bMRoj1SIcS41TAiB0=
S6oEUMbOk8P8z84ddj2EjV/RXepMWaGm
szGh2VGGgbguIM1zs28=
Qh9zlLk/6wVP5Ngynh8S0H6MZRU=
sw1RlQ8pzu8ALObSD4T92cc=
w1ot29pcYJipArc=
KgM/UIjjy+s0j8ZFhXXTxH6MZRU=
oJvgMZ3h5Onx0L4toB55b+iq7QZq7RU=
YVWqrfbxoNtorJ5KV9r53M8=
ngtbVp/jW32LYESy7SdUFRzhHYMp
LfBEhu75X77Y5K2lAoT92cc=
2WF9BELd2w0=
VUmgpdMcF0G5B763C4T92cc=
0DWY4FhpFVfZL3rYN5/IaiPhFQ==
XtU0eOnyq7gTerZee6mv
Sa2FDY/VzvI6jTxee6mv
b0ye9WSomZEGOajKzcS2
X9I4gBEUxutu0M1zs28=
oP9nZ5vu4yJneSyb8Q==
b8okJmZlIE1keSyb8Q==
qYbVKpOWPFNhOG7Ww4T92cc=
EgFgYKWqL7lCnkVee6mv
rghRYJPz6/H61lhLnZWG6iKhBQ==
k2vJyvFENUNxEMSd
k3DK3edZrEiT/LM=
GgtpvCU07j3DEFO8F5L7ymv8Hw==
ykd-services.net
Signatures
-
Formbook family
Files
-
4272-139-0x0000000000400000-0x000000000042F000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ