General

  • Target

    2760-13-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • Sample

    241023-ny6kaaybla

  • MD5

    92e6ba0a5d89bc6eb8c16b491f4d5092

  • SHA1

    d746434bfe54cb5934d66c2b8e0d0a2c61e778bc

  • SHA256

    215da7071158bfd9d6e776f12592208f61bb8a86523605fae2c8eed944e37e97

  • SHA512

    a7f0a4ef577328cc879ea4a1d83f80cbcfa720d0595081947f1a967510efb940f9d7ba50f86d918faac3f4a98c0422dca41b4af03ee3e0ef43a21d734f484756

  • SSDEEP

    3072:xzlIFrQ0JuWbSFgbvynm/B5SQ4a92pzHzDsG/kxhXJo2a5kcAPI0o+5:rR0pdmnm5ea92tHzR/kVov5hAPI0d5

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m17o

Decoy

kzqh72.top

arket-obybqq.xyz

afechoice.click

ote-knplpa.xyz

aqgpie.xyz

orker-ornp.xyz

he-beds321.today

ut-nlvv.xyz

31231827.xyz

milymariephotography.net

wquqo.click

veu-where.xyz

mjcpo-pick.xyz

yself-lpnbdl.xyz

austoowagosha.net

ive-wgag.xyz

lay-drift-palace.xyz

old-vubgv.xyz

ideo-shooting-courses.today

ntendsisaiasjazmin.shop

Targets

    • Target

      2760-13-0x0000000000400000-0x000000000042F000-memory.dmp

    • Size

      188KB

    • MD5

      92e6ba0a5d89bc6eb8c16b491f4d5092

    • SHA1

      d746434bfe54cb5934d66c2b8e0d0a2c61e778bc

    • SHA256

      215da7071158bfd9d6e776f12592208f61bb8a86523605fae2c8eed944e37e97

    • SHA512

      a7f0a4ef577328cc879ea4a1d83f80cbcfa720d0595081947f1a967510efb940f9d7ba50f86d918faac3f4a98c0422dca41b4af03ee3e0ef43a21d734f484756

    • SSDEEP

      3072:xzlIFrQ0JuWbSFgbvynm/B5SQ4a92pzHzDsG/kxhXJo2a5kcAPI0o+5:rR0pdmnm5ea92tHzR/kVov5hAPI0d5

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks