General

  • Target

    1636-64-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    672e9065114a348be62dca26f53e25e4

  • SHA1

    bddf3148849b59b6062f0b1c5bd2a24b8827f98c

  • SHA256

    79273f9b8f7b85b6d56c49c4e9870e5095d14c68f502d158033c5ed7fbcdff5e

  • SHA512

    c5ab866b35953c7d50f134ef1e80c590dd117ed4f665eb2783b7b61fcba93c4677d151ab661729c36bf580aa8065501602ab9e795efbd01fe4b4ccd6803ab1b1

  • SSDEEP

    3072:zI6AykP9vB8U23ArxkkZbxsrv4PBlD+1ZdZPZ0+D:GbgAdkWbxsrv4PBlD+1Zvn

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pi31

Decoy

allieduniversalbenefiys.com

gzpzgy.com

djuhsd.net

jeanniesartshop.com

bigbadmemes.com

journeymancamping.com

gila.africa

kally888.com

autoonlineschool.ru

goldentrumpbucks8product.online

mobonews.africa

bag-business.com

haiaidq.com

bestdfshelp.com

articpanelsystemsamericainc.com

fifa8866.com

ausmobile.store

improvisedml.com

jewelerfreak.com

ehealthpublic.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 1636-64-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections