General

  • Target

    544-63-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    2a58afe5f48f9d6f82a55aa3b67639fb

  • SHA1

    061766cc426f81082c56ae4931f8843aa6bf56a4

  • SHA256

    2d9f9bb6e609bca78f68b56b9929a651d4e627f0a8857ca5af24f006ee3d768b

  • SHA512

    4cdf35686f35ee696f72dc8e2e146c96ce42186dfe12298974f8b243701be1dcb9d2b99b84ee6e7400531bc763c31f3db2da5f13fef9d1bb59f069681dc0c010

  • SSDEEP

    3072:ZENmkxsCrP+Qf3KPIYnOQKCjdMKWRWeuY1GsKEPgUcKA5xkr:GvfKgYntKCjdrLY1GsKEPgQADk

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

j17j

Decoy

playphf.live

solarthinfilmtec.com

gdhaoshan.com

posh-designs.com

369andrewst.com

doverupblications.com

hengshangmei.com

decungo.com

checksinthemaiil.com

4localde.com

wetakeoveryourhousepayments.com

overcharge-center.com

mmmmmboulder.com

almaszarrin.net

enterpriseturkey.com

lanierfurniture.com

lhzb726-gw021.vip

onuiol.com

dmitrytodosyev.com

117uuu.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 544-63-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections