General

  • Target

    1804-57-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    64bb6ee0215126590fdf779bb2c19a91

  • SHA1

    f2ae14c8e95a4c8549bab1a4350f626ba23883f6

  • SHA256

    6ffb2990509368ae7d66faa25c5f8d37261af041847cd74966b2b30f1c323d06

  • SHA512

    bc4911238e9818cf2ab08570e30bc89db0119ff2387b6efbf83312899965ca52fae713dd25c617e07018163e8890c97f0323588b79f46d28d2335678c4d03159

  • SSDEEP

    3072:gTLAknp+InX1w3PWLhcpqN6epyS+rRV1Dx3frxv2ayq75TshsMDnwo5Tie:Ypb+P4hc0N6ecS+rj3f9+aF75Tshh75G

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

arn2

Decoy

girlzongrass.com

starphotostudio.co.uk

bugsbunnyexpress.com

kimeepayne.com

gtcoplc.africa

generativeseller.com

chain-bnb.com

diamante24.com

fine-and-good.com

vexlotex.africa

legendary-royale.net

draandreaprimera.com

geteit.com

epremiuminsurancce.com

adn-care.com

kazakhstanfootball.com

bizinares.com

folug.club

fuda808.com

internationalkia.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 1804-57-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections