General

  • Target

    832-140-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    2fbfc52140cf4146d7f9b0c84b271f18

  • SHA1

    6d51b93455982908af8a5f53beade8d3fb965783

  • SHA256

    ed7d8dbda44a77a826a3b0c1870aa7fd1069854e3b68a94fc2e4a06309ed60b3

  • SHA512

    37cba020811ab0f36e548bdb4de458ced83c2d3b57aa6cb69e3ae5db60f066a57ae2fcd29a9c5e7fdf53312b097289c18dd5c81f41b7cf131cc8b622e18cac95

  • SSDEEP

    3072:H1J3Fra85cG4c4ScidAZmQgV3bC6yBrvkw4ENyK7XzUoOE:TU8raidwtWbC6ydxZXooOE

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

tf6p

Decoy

poolcleanerskingsland.com

nieveslandscapee.com

wb263.com

smartlubetrading.com

linuowen.com

fna-seattle.com

jobgenie-ai.com

mycocktailmind.com

openai-invite.com

tnndjf5kyxz.com

mclane.attorney

somwear.xyz

spliffstudios.com

grupofaace.com

wuuwo.com

bigtimerushcharlotte.com

yourercchecks.com

arportablepottyrentals.biz

sbtsanantonio.com

explantationsbegleitung.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 832-140-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections