General

  • Target

    1340-64-0x000000000041F0B0-mapping.dmp

  • Size

    369KB

  • MD5

    04a11b653026975910b8d84aab8eae75

  • SHA1

    6846637e3104b622ff2dbdda0429862b13980343

  • SHA256

    d4a95c4a60d4cc2d92d77e7af17c1b8f708fb96c99ddea3b89dc98c799f9b5fd

  • SHA512

    1bc5aea8c40634e49baf305179106c754e4ca970c359a63f6dacfa93576625ee2f7c6679458fc84f1019a848c88fe230a774da86e2a596e2acd942ba84a32c72

  • SSDEEP

    6144:GIu75pGic6qzm3ovkY6fKrKdNdBIu75pGic6qzm3ovkY6fKrKdNd2:i5p1X8vkY6f6Kdb35p1X8vkY6f6Kdb2

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o12i

Decoy

dbepa.com

isenseot.com

trainwithmichelle.co.uk

eqhired.com

crushthehacker.com

fineartintimates.com

alphabet1x.com

gdnfys.com

bauav.com

frommm.com

easyquicklabs.com

cat-cazino.buzz

lowpriceaxis.com

brendaalonso.net

darkblissclothing.com

betrar355.com

help-web.ru

asxoffice.com

cityofparistx.com

beriterusyah.click

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 1340-64-0x000000000041F0B0-mapping.dmp