General

  • Target

    2180-11-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    ac3f6917340c674cf2718fe867dbe12d

  • SHA1

    6c74b3df51b751771f238e615136c01077f62ac8

  • SHA256

    a7961b7284937c11d1154d9d86c069ed96d6220c427388a2fa855705aa47ea56

  • SHA512

    5bcfe2bb69e115a48add4fc60592d51157d7c62a8a7be6985e3928498997e21e8eeeabfc64e0979ca887148ba4352fef1918787a40c9d5b2520af05e635a3a3d

  • SSDEEP

    3072:0bqkEFGfmkldW3Th5ofwEl6IozejjqAJJoWoYp52XmyI:nGZATbo16fzejjqqo7W

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bi05

Decoy

ollow-the-bit.online

aopho.autos

14ra567dp.autos

48651301.top

ussian-dating-54714.bond

sychology-degree-80838.bond

lytracker.xyz

strology-forest.sbs

swjbcl3.top

ridgenexttechnologies.partners

lroy.sbs

kyscreen.vip

anhit.live

uckyheart.xyz

orddserials.online

hetune.shop

nherited-traits-ant.bond

stanaslot-1.xyz

sychologist-therapy-36914.bond

iandramonami.net

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2180-11-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections