General

  • Target

    2464-44-0x0000000000400000-0x000000000042F000-memory.dmp

  • Size

    188KB

  • Sample

    241121-t4jklatakd

  • MD5

    422a526daa3653b05b1055c0cf30344b

  • SHA1

    aa5a976cb32df5328f1bbd9cd18d75d8ebd319a2

  • SHA256

    5b4c91d2b08a47c0652d2bb7684959b9ab5336419e2aef88fed3ac849dc9489a

  • SHA512

    44ad1e6266fbd504ea22a3574e767bfcd2fd91eef7fb9a609b1095fa98fe3b756d761a0b715e0dcf7f7e6f0e868f24b39f63b9fbc0a4d01473f9491c1cfb0eb9

  • SSDEEP

    3072:aAJixFri7Kg5KFiYXgdZFN1PaYXa+rg8oYeuCjZOWi8O0zqwmkWIo:ym7KbYZFH7a+rg8oYezZOW+0zbmkLo

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o62s

Decoy

lectrobay.shop

enisehirarnavutkoy.xyz

itoolz.net

otorcycle-loans-40378.bond

opjobsinusa.today

uara228j.shop

ukulbagus10.click

enhealth07.shop

cpoker.pro

ome-remodeling-16949.bond

andu.shop

hubbychicocharmqs.shop

onghi292.top

ussines-web-creators.net

alenspencer.online

ryptogigt.top

epiyiisigorta.online

ental-implants-77717.bond

juta.click

enisehirevleriarnavutkoy.xyz

Targets

    • Target

      2464-44-0x0000000000400000-0x000000000042F000-memory.dmp

    • Size

      188KB

    • MD5

      422a526daa3653b05b1055c0cf30344b

    • SHA1

      aa5a976cb32df5328f1bbd9cd18d75d8ebd319a2

    • SHA256

      5b4c91d2b08a47c0652d2bb7684959b9ab5336419e2aef88fed3ac849dc9489a

    • SHA512

      44ad1e6266fbd504ea22a3574e767bfcd2fd91eef7fb9a609b1095fa98fe3b756d761a0b715e0dcf7f7e6f0e868f24b39f63b9fbc0a4d01473f9491c1cfb0eb9

    • SSDEEP

      3072:aAJixFri7Kg5KFiYXgdZFN1PaYXa+rg8oYeuCjZOWi8O0zqwmkWIo:ym7KbYZFH7a+rg8oYezZOW+0zbmkLo

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks