General

  • Target

    2976-12-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    f55193eaeba68ba1a00ab2399a9846f2

  • SHA1

    42c83546dd5b1abe2b2590ec4d26cc8ccf101366

  • SHA256

    fc6ac8aa84d85aaaea302a45c168684f8455b5c0cde49d3515f4acf013144de7

  • SHA512

    586efcbe72baaac0658578a357c3ee9abfd346ae70e0d49c55a246a222623a706c37ca68de7552020fee0d3b64b9fc9f84a39a9f314b5d55f1ec6fa8292bead2

  • SSDEEP

    3072:2WfqxEcElcY/7Bc3Uh5ztebFk2e7yM78O5LvPvn2X/dXLuFUF1kY/B0:jWExlSUrcbFk2e78UjP+XlX51kqB

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fs83

Decoy

blastol.space

tomwalkerisfalco.com

us-sumatrraslimbellytonic.com

drywallandpaintingservice.com

vntapp.net

passportpages.site

at-mim.com

yeondagoods.com

teomanyildirim.com

paygame.site

senze.art

alhandco.com

9831bsej.xyz

traumatic.xyz

sos-soutien.com

thetechnolgy.live

washing-machine-46612.bond

marvsneakers.com

shequbaike.net

xc4f35fg4h35fg4h53.top

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2976-12-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections