General

  • Target

    600-43-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    95feb76849226ff781c7387278210fa0

  • SHA1

    dd30fe845a5dfbe7136b6d6d8815c5a6cb6202a9

  • SHA256

    8c2293b8e8e1380a68ff68bda0fe17a1b71d44db7f5a8dd59cda009843ac0455

  • SHA512

    a1ad757eb6aa6c7e123f0178bf97b88a2c503f84205fb95aee7c4f8637c705a3ea47579c304ffb8c3ae4818e7f8c7b66942b14e097f879df5d54d2f955d55282

  • SSDEEP

    3072:g2LWzsrFrFaY+UAX1POTdfzjyPSQqrMkpFrzTXUr3hJKCM52zoaf4HPAawYvqv2V:gzsLaX1Udf3yXqrRpFr+x4f52z34HUYd

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t2ti

Decoy

j6y.lat

kindlekidz.com

studio352events.com

merelweb.com

6061k.vip

iuk242.com

tiltedjava.net

importmotorshickory.com

codinnotech.com

foodapartcupboardscript.click

donovanmanuel.store

michealwilshire.online

clawenterprises.net

spacecargo.net

duadqps.com

allamericanshuttlellc.com

shucaimh.com

qivovrj.com

infynite1.net

albertcolet.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 600-43-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections