General

  • Target

    5e3cb24d52ef617a4dca51ece6721a0745a17909f1b7fd4a54a59ceba7ea32b6.ppt

  • Size

    71KB

  • Sample

    240606-wg2trsae68

  • MD5

    70f581be44790401f2e4945a777c565a

  • SHA1

    86393505d9723f2e3264128a13803baab7292fba

  • SHA256

    5e3cb24d52ef617a4dca51ece6721a0745a17909f1b7fd4a54a59ceba7ea32b6

  • SHA512

    e1f58ae897a37b16161ff534bcf83d59a9ba898d2107a55a1318935f42a97174e7a21b8dc0f345760ee78411f19e1e2cc5f7b76574a163d218fd3420ef28c2cf

  • SSDEEP

    384:dR728rkxCylE0MyPXbZIjmwiJHpMV54ycrxAfqTEdchSFo39D:v7OgsFMOrOmwiJQeEdcgo

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://%20%[email protected]/asdaxasdasxasdasdsddodkasodkaos

Targets

    • Target

      5e3cb24d52ef617a4dca51ece6721a0745a17909f1b7fd4a54a59ceba7ea32b6.ppt

    • Size

      71KB

    • MD5

      70f581be44790401f2e4945a777c565a

    • SHA1

      86393505d9723f2e3264128a13803baab7292fba

    • SHA256

      5e3cb24d52ef617a4dca51ece6721a0745a17909f1b7fd4a54a59ceba7ea32b6

    • SHA512

      e1f58ae897a37b16161ff534bcf83d59a9ba898d2107a55a1318935f42a97174e7a21b8dc0f345760ee78411f19e1e2cc5f7b76574a163d218fd3420ef28c2cf

    • SSDEEP

      384:dR728rkxCylE0MyPXbZIjmwiJHpMV54ycrxAfqTEdchSFo39D:v7OgsFMOrOmwiJQeEdcgo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks