General

  • Target

    a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151

  • Size

    65KB

  • Sample

    220521-egj6aahcg6

  • MD5

    b3955e1cda42b669f89dd5f2ece4534e

  • SHA1

    3e369400e83d66ebc6e704c6e2b7892f5907473f

  • SHA256

    a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151

  • SHA512

    9b82c26b9dd9d1f617a38922cfa058ee40d491b4b46fefd60238934e576859a54ae3ca534763649b25b1caea76c69f2800a21a3ade75420acff87608763d97ad

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://%20%20@j.mp/asdasjASDASDxaksxm

Targets

    • Target

      a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151

    • Size

      65KB

    • MD5

      b3955e1cda42b669f89dd5f2ece4534e

    • SHA1

      3e369400e83d66ebc6e704c6e2b7892f5907473f

    • SHA256

      a620c6c8eba080f448a230549de1e4653c7c9d661f7774b630e6d300edadf151

    • SHA512

      9b82c26b9dd9d1f617a38922cfa058ee40d491b4b46fefd60238934e576859a54ae3ca534763649b25b1caea76c69f2800a21a3ade75420acff87608763d97ad

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Tasks