General

  • Target

    8df334563bda9ebfdb62cd6dfefc46a1896c449b72c6587ccddb6365d17232fb

  • Size

    71KB

  • Sample

    241120-1czk3atnbw

  • MD5

    2019a97078177e1a30f7f45ea2ad0acf

  • SHA1

    12f83ef29430bc356eddc6cfce6de47c36e6edce

  • SHA256

    8df334563bda9ebfdb62cd6dfefc46a1896c449b72c6587ccddb6365d17232fb

  • SHA512

    946ae615b545f3c2264e9010eaf5deab46f08991128417fa382786502829f55691859c21b91c2bc99b5d9b6dad0b2b5d7230558789be0c43ddd780a3066afa8d

  • SSDEEP

    1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe2.html

Targets

    • Target

      8df334563bda9ebfdb62cd6dfefc46a1896c449b72c6587ccddb6365d17232fb

    • Size

      71KB

    • MD5

      2019a97078177e1a30f7f45ea2ad0acf

    • SHA1

      12f83ef29430bc356eddc6cfce6de47c36e6edce

    • SHA256

      8df334563bda9ebfdb62cd6dfefc46a1896c449b72c6587ccddb6365d17232fb

    • SHA512

      946ae615b545f3c2264e9010eaf5deab46f08991128417fa382786502829f55691859c21b91c2bc99b5d9b6dad0b2b5d7230558789be0c43ddd780a3066afa8d

    • SSDEEP

      1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks