General

  • Target

    b0726ae8ef93954b8aa39946ff5e487b3275ca422a50b9ce304113f0333fabff

  • Size

    101KB

  • Sample

    241119-v855tstndn

  • MD5

    d9a3d7d08c67f4da894e12c6dce59dfb

  • SHA1

    f31de6d6110f45af28b73ac33666f6d3f78a3ddf

  • SHA256

    b0726ae8ef93954b8aa39946ff5e487b3275ca422a50b9ce304113f0333fabff

  • SHA512

    887236fee9e4478086d4584278869c658d45f1c23c0752f3125029476dbe9d7b3e89f270c9983f1ee44c46d80e1881068d55c1e27fa94ab5a35ab9ff02d7da52

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      b0726ae8ef93954b8aa39946ff5e487b3275ca422a50b9ce304113f0333fabff

    • Size

      101KB

    • MD5

      d9a3d7d08c67f4da894e12c6dce59dfb

    • SHA1

      f31de6d6110f45af28b73ac33666f6d3f78a3ddf

    • SHA256

      b0726ae8ef93954b8aa39946ff5e487b3275ca422a50b9ce304113f0333fabff

    • SHA512

      887236fee9e4478086d4584278869c658d45f1c23c0752f3125029476dbe9d7b3e89f270c9983f1ee44c46d80e1881068d55c1e27fa94ab5a35ab9ff02d7da52

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks