General

  • Target

    00ac480eb8e89d69c6f7ad4b7.exe

  • Size

    29KB

  • Sample

    230705-qmc5psce92

  • MD5

    3d646a89bba2a562b8a491fe0a4fff75

  • SHA1

    728641affd87d450fb3596ec61b4e912f4aa91cb

  • SHA256

    00ac480eb8e89d69c6f7ad4b701801d4834aa3d9afbade4f3bb6701be52d5336

  • SHA512

    c49826f64775a19a32a7d41f74f3af18d68a0d3b2b7900a3173f1671f6db80b651559e62165608dc662d31b0895829bd7cacf5db609880a8e215a7c26d53505c

  • SSDEEP

    768:hSTg3sx6feommUxjfC30+kS4QyoY0ckCam:hH3sx6JmXYk4pZcmm

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://87.251.85.100/love/love3.html

Targets

    • Target

      00ac480eb8e89d69c6f7ad4b7.exe

    • Size

      29KB

    • MD5

      3d646a89bba2a562b8a491fe0a4fff75

    • SHA1

      728641affd87d450fb3596ec61b4e912f4aa91cb

    • SHA256

      00ac480eb8e89d69c6f7ad4b701801d4834aa3d9afbade4f3bb6701be52d5336

    • SHA512

      c49826f64775a19a32a7d41f74f3af18d68a0d3b2b7900a3173f1671f6db80b651559e62165608dc662d31b0895829bd7cacf5db609880a8e215a7c26d53505c

    • SSDEEP

      768:hSTg3sx6feommUxjfC30+kS4QyoY0ckCam:hH3sx6JmXYk4pZcmm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks