General

  • Target

    d9b0479e20ae6180720ff784ad26f59cdd49c268f539b38a7711dad576e49c26

  • Size

    43KB

  • Sample

    241119-ke4psssdrf

  • MD5

    c61a8f351ebcfaa423c86c636b9d6d3c

  • SHA1

    a25eb6b8972c524d9d03b96f4f0afcf037b4a5db

  • SHA256

    d9b0479e20ae6180720ff784ad26f59cdd49c268f539b38a7711dad576e49c26

  • SHA512

    7053a4a0366408066bdb5e5f61d9d4b3447c9efb23fc6d8507330f247fdca7d99a2f56abde66a586f19cd8fab23a537fefb506d1ddd09c3aa1e3df12d1935a9c

  • SSDEEP

    768:gg9fz2npoNO6jTLmy6EIvvS5tTxk80Ggh4akRHWBlLWurRY7sh0nsYZgkmmGA0i:ggx2npsOxfvveTk80GmkUlLdr4sYCkmW

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe2.html

Targets

    • Target

      6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5

    • Size

      71KB

    • MD5

      21fc12ef8a4a4ba5b38a303fa7e70c08

    • SHA1

      5700a2231371b289eae19ce62e1a73457ee582c4

    • SHA256

      6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5

    • SHA512

      8200f14c0a8023bb74b39796f7859258ef67a21a5f81704f82315695409795fe724ac8ca81513a95d50d169c824532e43865846ce42b0e541366309ace849654

    • SSDEEP

      1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks