General

  • Target

    3392-139-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • Sample

    221209-a1y2bsbh97

  • MD5

    dc40b1d462e35f65cdc515fe9371e855

  • SHA1

    0ea52a2c65e0f0714df1b50ef16b719132ceb4da

  • SHA256

    224a2501521d52a8f149511c75c165bd08ab4e5b0f3db71c1853bfb1d0a27da9

  • SHA512

    ebf0e7c99e137d2f1d32a4b5fb700fc73cf8cae0a5159b499d70a5267b84a8276425420ec098e005d393e7934ec48d07cee86d433256a15a438c3f4c899e69ec

  • SSDEEP

    3072:C3Y2i757hNP34Js1pWtavo0Ax9pn6LSDsuQPar+FA9WDNtlEtSDT2doah+g7TT:C3Y2i7hJ3t1IacHnKYhF6A9WdE8DTFc5

Score
10/10

Malware Config

Extracted

Family

formbook

Campaign

yurm

Decoy

X06d1tis1GUX/R0g87Ud

BKiZ33D1P766GVXO1ZwV

lAFdjB7CSxGX8Trz

Gc7dWizTVxWX8Trz

tDkr9JAfi1OHAW1PGOageIp4

bCpMtHKU3mVp8BY5sQ==

7WKpsMWt8nsrhJClJeOZNg==

0A9KTlETQ86Cmd8k0o5NP5RwCg==

aJ61paNJztSp42c=

CrgoA8ySIOsytCbO1ZwV

i46SnHYDD9tTIHI=

XFRCRCjtFZeU3x4Rn3xfD5BnPz+RDA==

c4CZghuHvzW9A31gEz0d

QAjzz9qyRRWBNYseAI4M

Jpbmu4A1YvBvN3ruZgiRmJA5BCFd

PfoFXGNFhhuX8Trz

bqCfk0m8ApAl+Tm1Ms5Tb23IT7tS

z7INff7HNALxc5HWq2/ftrVR6A7R1zvTUQ==

m7IShV4LSFxbqxhrVsZ1Ig==

BHRp7q0gtoRuqBRnVsZ1Ig==

Targets

    • Target

      3392-139-0x0000000000400000-0x000000000042F000-memory.dmp

    • Size

      188KB

    • MD5

      dc40b1d462e35f65cdc515fe9371e855

    • SHA1

      0ea52a2c65e0f0714df1b50ef16b719132ceb4da

    • SHA256

      224a2501521d52a8f149511c75c165bd08ab4e5b0f3db71c1853bfb1d0a27da9

    • SHA512

      ebf0e7c99e137d2f1d32a4b5fb700fc73cf8cae0a5159b499d70a5267b84a8276425420ec098e005d393e7934ec48d07cee86d433256a15a438c3f4c899e69ec

    • SSDEEP

      3072:C3Y2i757hNP34Js1pWtavo0Ax9pn6LSDsuQPar+FA9WDNtlEtSDT2doah+g7TT:C3Y2i7hJ3t1IacHnKYhF6A9WdE8DTFc5

    Score
    3/10

MITRE ATT&CK Matrix

Tasks