General

  • Target

    3040-2-0x0000000000220000-0x000000000024F000-memory.dmp

  • Size

    188KB

  • MD5

    4709f3856b95cc72b4eaf6655843e3af

  • SHA1

    3eb7d0f4258510b5c1971b6a37c56accc8d3b479

  • SHA256

    ab7fb2056406acce593dc218265c0e5be6d3a8abe6508e4ac0c13fe8f609ed77

  • SHA512

    e76d3f9f5b79a7142fa8934f8719f389aadd4baba79c02bef129c98900056ea085acc3217ad23cd283250b62ec3f9155b4527074915c9a2be9749c92b048dd26

  • SSDEEP

    3072:FJ5bcEeEV5ubIJv3ccQP2dpcKuEZ/g905EmS/iYQYKGOGSXLmTRa4hkETVU8E:dVRvclud+KuEZH5EmsZQmTIgB

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ce10

Decoy

universalbowls.com

bp5.site

thiagokielingwebdesign.net

grapper.fun

grow-more.us

cqdh888.com

facthunter.app

cstars05.xyz

baumeagency.com

montevallotowing.top

joshtdownes.com

ampvit88.info

timelesscoutureclothing.com

stimuscle.com

uppervillekeyword.top

victoriabaltzer.com

laguindah.art

kiddieboost.com

santafekeyword.top

818experience.com

Signatures

  • Formbook family
  • Formbook payload 1 IoCs

Files

  • 3040-2-0x0000000000220000-0x000000000024F000-memory.dmp