General

  • Target

    2800-11-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    6f3b0e2f84095e5f805086b8c9299917

  • SHA1

    78227c8725cc9da4cb4f8df081b337772821000d

  • SHA256

    7f6df01197da9076be7f26b86e7ef437bd45eb19ac22ab5f95f8e6ba82232be3

  • SHA512

    78f66da12d80a281314e81b137234c9a6ada7d4d4be37d9d656bf42e67a22c3b5e53fd1970651f9501a69a5f827c9fa8f32017a0026a2476ecdb85b318e70677

  • SSDEEP

    3072:tvXQ9EzCWCcPlV3rYR+u8wDDqWIXV5dJ5PykXeQhB9McI2I9EHMzK:tHj5rs+ujqWIXVPHykDNZRH

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

da29

Decoy

kas-travel.com

hy1618.net

biosrch.com

sharvellestudio.com

56416.ooo

953700958.com

500051.com

clic.coach

veriosg.xyz

aptsafety.com

cucinaconestilo.com

sercettopper.com

diycoldplungetub.com

hostingopinion.com

mediatechnologysolutions.com

nodogwifnohat.com

ethpiee.com

tragaperrasbares.com

bbbcf.top

jtxu6.top

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2800-11-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections