General

  • Target

    1472-62-0x0000000000400000-0x000000000042C000-memory.dmp

  • Size

    176KB

  • Sample

    220913-qdf51affe4

  • MD5

    6f960650523c84438a9a5ba554a2ee84

  • SHA1

    54beb27824a335edac64755a84dca60f70fe71b8

  • SHA256

    a7db7e0021a9d50aa74572bc015dcabc00f78b252a80a497ccd23e85e4ee4a41

  • SHA512

    889f224d52c4a26ed65e99d84a80054835d6504bed41431f8d3eadc677ed8a864d8e45ecc506a30f0db51bfaaef2a1356ae071a6c7444879df67409c6c7aaaa2

  • SSDEEP

    3072:hYk/2miv7IOFYhWErUKJopFTvbNDjgSDh48q/MZPcQIeixw4mOuPwb5em+D2x:r4NFY5UKyTvJDj7F48q/aIea8B2x

Malware Config

Extracted

Family

formbook

Campaign

zzun

Decoy

JnNtRHyNupy0GqRzAcasu7hb4rc=

Qv593NGLE7p9UNSaVkPXljAJm2QCNnc=

ePArIFWvjkkMgVEVhw4M4Jk=

26rqUwJ7dD0AiDI=

pBAxMHeK741QFw==

kHD7TPt5846pUMTX

56UnjFjHL1i0j659h3LymRnHpQj+SshC

4vKlKHflPqmWXRbrRwfPtrhb4rc=

6LBd4qButFAi

phMzGll8Ue7Fu+inq5cdnPaSugG3

NKswiQGCvZoG5FgsdHEI

rtTHnuUY8M1qVcXV

SOmECrlAt2oGAA==

L1ep9adutFAi

/UE+/AyvE6uEl28weFI=

IP+xMPQxJR4NE6TK

xvW5GN9/rqA5YUoOVt185Sf7Uw==

fRFNW9DhxL6VF7LA

KFYTfkaY741QFw==

W4JGvMBmt2oGAA==

Targets

    • Target

      1472-62-0x0000000000400000-0x000000000042C000-memory.dmp

    • Size

      176KB

    • MD5

      6f960650523c84438a9a5ba554a2ee84

    • SHA1

      54beb27824a335edac64755a84dca60f70fe71b8

    • SHA256

      a7db7e0021a9d50aa74572bc015dcabc00f78b252a80a497ccd23e85e4ee4a41

    • SHA512

      889f224d52c4a26ed65e99d84a80054835d6504bed41431f8d3eadc677ed8a864d8e45ecc506a30f0db51bfaaef2a1356ae071a6c7444879df67409c6c7aaaa2

    • SSDEEP

      3072:hYk/2miv7IOFYhWErUKJopFTvbNDjgSDh48q/MZPcQIeixw4mOuPwb5em+D2x:r4NFY5UKyTvJDj7F48q/aIea8B2x

    Score
    1/10

MITRE ATT&CK Matrix

Tasks