General

  • Target

    2022-1-28-d5b772ae7545aa12c1c1ac69068186a7.bin

  • Size

    47KB

  • Sample

    220128-bla7dsdfbn

  • MD5

    d5b772ae7545aa12c1c1ac69068186a7

  • SHA1

    9cc3f88fb9d34e9be8298390968676b9cb27c4b1

  • SHA256

    a107efdc485af702765f756860612789d1162c07eccdf6d2603edf2039a6646c

  • SHA512

    099a9509c524bd625238e132786ab59c8f40c1572b8dacbd05d74bcea154f726e974c77a5d56cd0d818776520d0e04b561a195ba4279c412d185bd10521545eb

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/vvv/ppp/fe.html

Targets

    • Target

      2022-1-28-d5b772ae7545aa12c1c1ac69068186a7.bin

    • Size

      47KB

    • MD5

      d5b772ae7545aa12c1c1ac69068186a7

    • SHA1

      9cc3f88fb9d34e9be8298390968676b9cb27c4b1

    • SHA256

      a107efdc485af702765f756860612789d1162c07eccdf6d2603edf2039a6646c

    • SHA512

      099a9509c524bd625238e132786ab59c8f40c1572b8dacbd05d74bcea154f726e974c77a5d56cd0d818776520d0e04b561a195ba4279c412d185bd10521545eb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks