General

  • Target

    4016-4-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • Sample

    240923-q1nhlaxgln

  • MD5

    4e3308dd35d01bec27835ea704ad2add

  • SHA1

    72b21d6a4fb0a10059bcf77faea4cbf7e372905e

  • SHA256

    7cca32fad7c7128e5e567f10f9472871cb7e7bfc35b95e6b8d1390a2462fc7ea

  • SHA512

    6c591dbd5a73b100c7a2951687153d1c465bba8afc50136c9f28a66cdd32879161f0b2d2f0d6d8cff065b980a8aa07f248b3f5211d3a36d322d4e478f8d84822

  • SSDEEP

    3072:KaNnFrHShnGoc/TiRPwNhRDUb1DGSa2swDBlfbet5puifn4:VBSW+Ro3SbVGSa2JD3zet5puiP

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c89p

Decoy

ftersaleb.top

dcustomdesgins.net

ostbet2024.live

rhgtrdjdjytkyhretrdjfytd.buzz

atauniversity.tech

idoctor365.net

x-design-courses-29670.bond

ellowold-pc.top

ransportationmmsytpro.top

areerfest.xyz

artiresbah-in.today

ijie.pro

torehousestudio.info

69-11-luxury-watches.shop

earing-tests-44243.bond

hits.shop

hzl9.bond

lood-test-jp-1.bond

livialiving.online

usymomsmakingmoney.online

Targets

    • Target

      4016-4-0x0000000000400000-0x000000000042F000-memory.dmp

    • Size

      188KB

    • MD5

      4e3308dd35d01bec27835ea704ad2add

    • SHA1

      72b21d6a4fb0a10059bcf77faea4cbf7e372905e

    • SHA256

      7cca32fad7c7128e5e567f10f9472871cb7e7bfc35b95e6b8d1390a2462fc7ea

    • SHA512

      6c591dbd5a73b100c7a2951687153d1c465bba8afc50136c9f28a66cdd32879161f0b2d2f0d6d8cff065b980a8aa07f248b3f5211d3a36d322d4e478f8d84822

    • SSDEEP

      3072:KaNnFrHShnGoc/TiRPwNhRDUb1DGSa2swDBlfbet5puifn4:VBSW+Ro3SbVGSa2JD3zet5puiP

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks