General

  • Target

    aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc

  • Size

    64KB

  • Sample

    220117-1yc9ysdaa5

  • MD5

    9c04ae80f6d403f686236383673c96e5

  • SHA1

    aa036250ec5886e05c0bc63df44a72ffedd9f056

  • SHA256

    aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc

  • SHA512

    256b0da900c5145927c0ea3de95b97fa19d0478a0618b14a5c0fc06fe55d708d0ee796aa69686ad1b0446f145b81783c36859573003d257b462d5419016b13a6

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://0xc12a24f5/cc.html

Targets

    • Target

      aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc

    • Size

      64KB

    • MD5

      9c04ae80f6d403f686236383673c96e5

    • SHA1

      aa036250ec5886e05c0bc63df44a72ffedd9f056

    • SHA256

      aafb383aa037a43175e0f54162dcd03405ec541a150e6752d7193995ef9071cc

    • SHA512

      256b0da900c5145927c0ea3de95b97fa19d0478a0618b14a5c0fc06fe55d708d0ee796aa69686ad1b0446f145b81783c36859573003d257b462d5419016b13a6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks