General

  • Target

    1752-64-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    f05eca0d7ee045f5dac0aace74037936

  • SHA1

    94c739be51631bc986ce69b4189899cc74c7e0e3

  • SHA256

    d4252c1e2167042a9356a8c1355d93387c6b397814f0c753258def7f8bacbcdd

  • SHA512

    bf6189f65ec1669bcbf1f7ceed070c86d7da20c204c44d0052c913f2e23793df7c5505e656c44ae44cfa112123dda5016b7bf6cd2d9376d9af4dd67ff3919a25

  • SSDEEP

    3072:gnkhdFr9sg4LrZalNVQG/O2rxp76ycpXCrGM4qOsm1Tp4kPjRB9E:7FscJQGW2L6ycpyrT5m9p4kPjRBa

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

nes8

Decoy

simantsfamily.com

ninobrowndelivery.net

y94x.info

huibi01.vip

davidspanu.com

swegon.tech

moapulsa.com

coveredseguros.com

owltoon.site

loyalguardianop.com

banca-particulares.icu

innovativanimal.com

girlschools.top

smartbed-gb-tok.life

vhail.store

bluffdalecitizens.info

asmcpn.us

wordybag.online

smmfsa.com

jinglunqhd.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 1752-64-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections