General

  • Target

    4d37b158686a8de67e3c7168e5ff3d92

  • Size

    9KB

  • Sample

    231226-c5cp1abbh4

  • MD5

    4d37b158686a8de67e3c7168e5ff3d92

  • SHA1

    265ea170c619bd2e7cb0a82cd80c993c9aba8a6e

  • SHA256

    16f1a327b2b1aa4c871a5e9ddf0718f575d03ae72e782d12110f87eb5ce2f119

  • SHA512

    b4e48d00c94feec5df8abb3e734153eb7459d6f1c039df003a5382a3b2673ba7a68703eadd5bb85bcd67ba85e8a2fc498fe603fde4d466a4bc34294ca8cf4e3a

  • SSDEEP

    192:37XqmtJR1qooVw7ZIdqkS6iGhEoNwSQTO2bbK8fEYp:3JtMooCtI4IiGu9SAxK8d

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://www.bitly.com/asdodoasdoa

Targets

    • Target

      4d37b158686a8de67e3c7168e5ff3d92

    • Size

      9KB

    • MD5

      4d37b158686a8de67e3c7168e5ff3d92

    • SHA1

      265ea170c619bd2e7cb0a82cd80c993c9aba8a6e

    • SHA256

      16f1a327b2b1aa4c871a5e9ddf0718f575d03ae72e782d12110f87eb5ce2f119

    • SHA512

      b4e48d00c94feec5df8abb3e734153eb7459d6f1c039df003a5382a3b2673ba7a68703eadd5bb85bcd67ba85e8a2fc498fe603fde4d466a4bc34294ca8cf4e3a

    • SSDEEP

      192:37XqmtJR1qooVw7ZIdqkS6iGhEoNwSQTO2bbK8fEYp:3JtMooCtI4IiGu9SAxK8d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks