General

  • Target

    2464-44-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • MD5

    422a526daa3653b05b1055c0cf30344b

  • SHA1

    aa5a976cb32df5328f1bbd9cd18d75d8ebd319a2

  • SHA256

    5b4c91d2b08a47c0652d2bb7684959b9ab5336419e2aef88fed3ac849dc9489a

  • SHA512

    44ad1e6266fbd504ea22a3574e767bfcd2fd91eef7fb9a609b1095fa98fe3b756d761a0b715e0dcf7f7e6f0e868f24b39f63b9fbc0a4d01473f9491c1cfb0eb9

  • SSDEEP

    3072:aAJixFri7Kg5KFiYXgdZFN1PaYXa+rg8oYeuCjZOWi8O0zqwmkWIo:ym7KbYZFH7a+rg8oYezZOW+0zbmkLo

Score
10/10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o62s

Decoy

lectrobay.shop

enisehirarnavutkoy.xyz

itoolz.net

otorcycle-loans-40378.bond

opjobsinusa.today

uara228j.shop

ukulbagus10.click

enhealth07.shop

cpoker.pro

ome-remodeling-16949.bond

andu.shop

hubbychicocharmqs.shop

onghi292.top

ussines-web-creators.net

alenspencer.online

ryptogigt.top

epiyiisigorta.online

ental-implants-77717.bond

juta.click

enisehirevleriarnavutkoy.xyz

Signatures

  • Formbook family
  • Formbook payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2464-44-0x0000000000400000-0x000000000042F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections