General

  • Target

    644-60-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    3411a6d7d604f90aac4d9abd94e7a8f1

  • SHA1

    86ffca82de5111b16e447c39c2bd59b35d5dfef2

  • SHA256

    b7cffeefbfdd3e52988aebcd59d47b35f31cf670ac47886a59059164339b2533

  • SHA512

    ad74864e6289e59eefdd0aa5ce92071b82744649ca46594d6decbaac1d4a9d13b2af18a2d0b6171f3eb7ad655b436c2a1040919fa917845258d3c19d320c63b0

  • SSDEEP

    3072:tJjbkJy5B1uby3tAgigqyRA8Nw59A+VahknshfI4EDYP4X63H:lgktlNqyRA820AbnsVIBxX

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ub76

Decoy

id2567.ru

45594.uk

bestcallgirlindehradun.com

borobounce.com

lancoyorks.com

galoshesverdict.com

electric-cars-84428.com

babuildingservices.com

armal.net

99gaokk.com

exusianations.africa

leerhet.com

celebrantveronica.co.uk

aftericon.com

megafilmeshd50.app

winsf.net

gasuver.com

advisoramplifier.com

curtisdelgrosso.com

autocentrezac.site

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 644-60-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections