General

  • Target

    f34ebf6c6d7ecb9b0bfe703e454b265bdadb718567b9abd4ce3a3efe4f61475d

  • Size

    43KB

  • Sample

    241115-npf82aspdt

  • MD5

    a5d118917c4fbb53621bfc2ed9bd8825

  • SHA1

    b1383b656e10effca759f28a2ce18919737342d3

  • SHA256

    f34ebf6c6d7ecb9b0bfe703e454b265bdadb718567b9abd4ce3a3efe4f61475d

  • SHA512

    dcf7711cb141db483cfc78b24b4df505e024de6a1d13215e93e7819ac5ed977f4dba3dcfa7e736d606dd4dc7308b48dfd015b2d3e81b093aac58858043be2585

  • SSDEEP

    768:ag9fz2npoNO6jTLmy6EIvvS5tTxk80Ggh4akRHWBlLWurRY7sh0nsYZgkmmGA0k:agx2npsOxfvveTk80GmkUlLdr4sYCkmY

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe2.html

Targets

    • Target

      6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5

    • Size

      71KB

    • MD5

      21fc12ef8a4a4ba5b38a303fa7e70c08

    • SHA1

      5700a2231371b289eae19ce62e1a73457ee582c4

    • SHA256

      6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5

    • SHA512

      8200f14c0a8023bb74b39796f7859258ef67a21a5f81704f82315695409795fe724ac8ca81513a95d50d169c824532e43865846ce42b0e541366309ace849654

    • SSDEEP

      1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks