General

  • Target

    872-66-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    214fc9ac9869e519af4917d56765a16b

  • SHA1

    95c1cc4f05629c2d1d797cb1f36b5458fef116fa

  • SHA256

    b287e36b2ddc84986788ff4fa75245eddafb09daa74438cd51c29f32d26c8bd0

  • SHA512

    ec78200b6785052ce9acb034da5dfc78ea109748010ac43b41324f3ec5f16e634977b3082b7b17e1f20b17abdf1dfd7ac0138c930d364d82ccc10a6c139707ec

  • SSDEEP

    3072:lqXONkOlwpno75f3esylwb6y1KNHsYv6Z/mZjiLBGm:5jfe7G6y1KNQZ/KGL

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k04s

Decoy

draanabellrojas.com

in03.one

kyraloves.co.uk

laluma.store

londoncell.com

kanurikibueadvocates.com

buyeasynow.net

escapefromtarkov-wiki.com

crewint.net

f-b.boats

beautyaidstudio.com

ashfieldconsultancy.uk

dlogsadood.com

ftgam.xyz

constantinopanama.com

yellowpocket.africa

konyil.com

easomobility.com

1135wickloecourt.com

indexb2b.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 872-66-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections