General

  • Target

    1916-395-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    0956cab21530e771f7449f93f748c7e3

  • SHA1

    05a739202624d22650473bfa00e6c584c5c7952d

  • SHA256

    c1893e6494fa6e2b3dfd5a4ece5387194fb301b88c877361b2b53a79e17b35e2

  • SHA512

    3d522aa7e18ef64417296b5d8d63a87babeadbffb7cbd261380a5f62e4a734cd9d3dd135cd851aa40149ff25d1963f30385d14832a3ade4111e1c375f1d363f6

  • SSDEEP

    3072:YaWUYEFrq/RPitHkdnq2Se86UUQH6ow8f7Wg+HEUL4D1Uhtl5Za:Hk/R/tSefg6ow8fag+HD8Gh5Y

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rhtn

Decoy

ctwlabs.com

zaimjefhi.online

janetsboutiquestore.com

srello.com

dk1380.com

thuphangahhome.com

usahealthcarenetwork.com

ostbet.com

artbacus.com

kuaitaobao.net

aeinnamehranandegi.com

glassesbestselect.com

drain-pipe-cleaning-47086.bond

beyondhorsemanship.com

cottonfuturesbook.com

fairfieldcountyb.com

worldtoronto.com

onairnepal.com

kongmad.com

host-u.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-395-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections