General

  • Target

    a642d721f4206bdecb3fe07b1d782313f33b89f088fe8b3cc6784ed3ed02ab14

  • Size

    69KB

  • Sample

    241119-ww8wmavjdj

  • MD5

    e5d2ac8eacf8f492bd57e2d850deaa3b

  • SHA1

    7c546fd6c22dcddd93d656075ae63990349de887

  • SHA256

    a642d721f4206bdecb3fe07b1d782313f33b89f088fe8b3cc6784ed3ed02ab14

  • SHA512

    e1b2867713497b9460da1363514196503c858e783229a14339ad3b737a0cb7fee176c8de775c6a55d15171ab3c53018513eb4b413e9ca1ec00a4c589d4ad407e

  • SSDEEP

    1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe2.html

Targets

    • Target

      a642d721f4206bdecb3fe07b1d782313f33b89f088fe8b3cc6784ed3ed02ab14

    • Size

      69KB

    • MD5

      e5d2ac8eacf8f492bd57e2d850deaa3b

    • SHA1

      7c546fd6c22dcddd93d656075ae63990349de887

    • SHA256

      a642d721f4206bdecb3fe07b1d782313f33b89f088fe8b3cc6784ed3ed02ab14

    • SHA512

      e1b2867713497b9460da1363514196503c858e783229a14339ad3b737a0cb7fee176c8de775c6a55d15171ab3c53018513eb4b413e9ca1ec00a4c589d4ad407e

    • SSDEEP

      1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks