General

  • Target

    1104-64-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    68ec1495c42cbd2e7e9da30343b45c46

  • SHA1

    75c0a2d5aa58c1e335a06fb078d5c35d719d9e36

  • SHA256

    5170fd505487f13fc6b7368bde7a794ad01d5d06295a0acd6437bb8b41680e08

  • SHA512

    024b5e0430d44cb23a7cd8430936b7bd2beaa3790ff95b6ceeb9236505a03c076734a9e1071b63db896bac731f081ef422056ba33bc73e92eabb1ab168e5810d

  • SSDEEP

    3072:44UOkvuOpSq/273PB9Qei/eKhyI1o9tkwWktGZVPI3kc/bfgw:euOkTPLQcKhyI1GkDFZNI0iLg

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gn28

Decoy

creamation.live

chopsticksguate.com

cellittinotaryservices.com

bit-atm.com

utieba.com

biohackingthyroid.com

babyclothes-store.com

greatopenroad.top

surreyroofingsupplies.co.uk

woodflaircc.africa

f3335.com

phoenixfloorcoatings.com

66y141.xyz

afisff.cfd

chatwithpsychics.com

atsefroidclimatisation.com

brueggersmmmuffinscanada.com

cclcoin.com

aberto-translation.com

nisekopiraestates.net

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1104-64-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections