General

  • Target

    2180-0-0x0000000000400000-0x000000000052F000-memory.dmp

  • Size

    1.2MB

  • MD5

    3564affa92216a487a52c3348ee16286

  • SHA1

    1ee87fa672ff32a24681b1ff457cb96aa34e8be2

  • SHA256

    f27bef2ff411f733d8c94570fb2e4e6701854c62624b635ebd76a2372b8f1b9c

  • SHA512

    15faa985c30774bacacdaf7a024951c54fb1705e3a68149f0c5fea20c5cef63201de62cd3e92544842be28de4e422bd70769377a5e033311e175265d7b88401b

  • SSDEEP

    12288:7dvHD7X2OIU6kka/6HfU4l69SnDOorGNO7c4KuTmvzKI3aCnEjBijKvm3CMVBAVz:51/6kk9HfhFnDOoLc4KDbmmDVBAB

Score
10/10

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

ca

Decoy

etrade668.com

witchwardrobe.com

fresh-express.info

court-of-protection-abuse.com

mydomaine.pizza

chiquirritmo.com

goldennestconstructions.com

gldqn.com

songkorea.com

epaqint.com

3201wargyle1s.info

batdongsanhungphu.com

higheredandbeyond.com

tenpro25.date

drzcapital.com

corporativoacarsa.com

happyupward.net

aljyc.link

travellerit.com

dazhongpuhui.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2180-0-0x0000000000400000-0x000000000052F000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections