General

  • Target

    1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1

  • Size

    281KB

  • Sample

    220913-3vslkscfen

  • MD5

    7e71829ba50b8a21a57ddfeaa49745f8

  • SHA1

    372f33e4068ba6cccea8416d65c6b4f01710ee56

  • SHA256

    1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1

  • SHA512

    35c8507f8061530769ec3e315887f50eadb951f4f28ba2ec899bec41fbafa4eef315e20bc65154c2daa18bb3aedcc8c472315db85fa5312cf9ac7c61cfa97493

  • SSDEEP

    6144:wPVyTbVLydSNjUKjt77qShcr+jdT5uWMC4T5uWMCBT5uWMCGT5uWMC/T5uWMC0Tn:HXVOSjUKsShcr+xT514T51BT51GT51/u

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://www.mediafire.com/file/8cc0e6ohfqnk7yp/3.htm/file

Targets

    • Target

      1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1

    • Size

      281KB

    • MD5

      7e71829ba50b8a21a57ddfeaa49745f8

    • SHA1

      372f33e4068ba6cccea8416d65c6b4f01710ee56

    • SHA256

      1b2215a804fff054e6936894958c7432956e363bb98e377eea63ec91030daff1

    • SHA512

      35c8507f8061530769ec3e315887f50eadb951f4f28ba2ec899bec41fbafa4eef315e20bc65154c2daa18bb3aedcc8c472315db85fa5312cf9ac7c61cfa97493

    • SSDEEP

      6144:wPVyTbVLydSNjUKjt77qShcr+jdT5uWMC4T5uWMCBT5uWMCGT5uWMC/T5uWMC0Tn:HXVOSjUKsShcr+xT514T51BT51GT51/u

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks