General

  • Target

    aaa8079a9c9eda6f8fa98f7a71800ec53a5e639df2c8a29b376f0cc7c3bd7d40.xls

  • Size

    36KB

  • Sample

    220128-dw7dpaehfm

  • MD5

    b2ff7975fc16c578027e87cc2d63efd5

  • SHA1

    c3e163b2127f7fbf8de65045ed1e82f391e66582

  • SHA256

    aaa8079a9c9eda6f8fa98f7a71800ec53a5e639df2c8a29b376f0cc7c3bd7d40

  • SHA512

    a3b1f24c39a8b20d1c88a942681b0430ef3e4c2eae14917437ad97fa34def7e116d46aa5055417ab849650cb9db6309fc466a6f3ee2ecf24469ea192aed15f46

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/oo/aa/se.html

Targets

    • Target

      aaa8079a9c9eda6f8fa98f7a71800ec53a5e639df2c8a29b376f0cc7c3bd7d40.xls

    • Size

      36KB

    • MD5

      b2ff7975fc16c578027e87cc2d63efd5

    • SHA1

      c3e163b2127f7fbf8de65045ed1e82f391e66582

    • SHA256

      aaa8079a9c9eda6f8fa98f7a71800ec53a5e639df2c8a29b376f0cc7c3bd7d40

    • SHA512

      a3b1f24c39a8b20d1c88a942681b0430ef3e4c2eae14917437ad97fa34def7e116d46aa5055417ab849650cb9db6309fc466a6f3ee2ecf24469ea192aed15f46

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks