General

  • Target

    fcee78011c0aa43cdb180bf7aff0a103

  • Size

    9KB

  • Sample

    231228-2e6b3aeggj

  • MD5

    fcee78011c0aa43cdb180bf7aff0a103

  • SHA1

    d0bb375012e97cebb90df08c3f37fba27155e4ed

  • SHA256

    b5234fe19608319fbe81d2fa81a1f82e894eaa87c4423cc64a8f177d1451fba5

  • SHA512

    42a7b5963ee5e7adb31586c43836f66cf643b5aea31714da37d0aa4832ecf46689de18a689523778dd76d30e5f5e143fbe7a05876f914dc4b41f85d88baeea41

  • SSDEEP

    192:37XqkBMB8ZQpMS8dbY+fqpAC6PI9F2kGRIp6p/O+1KNV2urQPq2H:3HBMBTrcY+oACy/xG+wBS/H

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://www.bitly.com/asdodoasdoaokowd

Targets

    • Target

      fcee78011c0aa43cdb180bf7aff0a103

    • Size

      9KB

    • MD5

      fcee78011c0aa43cdb180bf7aff0a103

    • SHA1

      d0bb375012e97cebb90df08c3f37fba27155e4ed

    • SHA256

      b5234fe19608319fbe81d2fa81a1f82e894eaa87c4423cc64a8f177d1451fba5

    • SHA512

      42a7b5963ee5e7adb31586c43836f66cf643b5aea31714da37d0aa4832ecf46689de18a689523778dd76d30e5f5e143fbe7a05876f914dc4b41f85d88baeea41

    • SSDEEP

      192:37XqkBMB8ZQpMS8dbY+fqpAC6PI9F2kGRIp6p/O+1KNV2urQPq2H:3HBMBTrcY+oACy/xG+wBS/H

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks