General

  • Target

    2420-63-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    36f54d5979c4a91be64cd55d1dbccb22

  • SHA1

    1282880d071bda43635b4e165b3cb204cfadf01b

  • SHA256

    ead9b9c37d63a3b18959e6f4926d76364408f76ed882fad8e8b34ec496702bda

  • SHA512

    3f171b3bb57648dca964a0845e633974506ad37d630ab0863185cbaf6d529b762e5f9302808c22bd9f579a8b7888b9aba2f6c46bc24529ca0bc69ff6f72127f5

  • SSDEEP

    3072:IEdE8irAyjY310+dzPEFpssdBzI5U0maoM3hRI3s11t/BTPTy/:L4W1HFapssdEU+3his1NrA

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

s0g5

Decoy

zj36ys.cfd

bense01.com

momentobeleza.com

bridge-polygon.net

pinyancollection.com

medvedevgave.com

hungrycatcol.com

gdasxo.xyz

vacanzainabruzzo.com

omtmmcio.cfd

extendkin.com

vlamuhendislik.com

hhor.info

tqzcqnuh.cfd

pinyancollection.com

3t8x1r.cfd

xkwi80.cfd

top-1234.com

3dy.shop

condo-roofs-r-us.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2420-63-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows x86


    Headers

    Sections