General

  • Target

    a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d

  • Size

    128KB

  • Sample

    241120-1k4vratdph

  • MD5

    72d08e1daa18c52c17a0f5509f26b851

  • SHA1

    28936bbd4c5043b3e271c5ef218256158e5f46d3

  • SHA256

    a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d

  • SHA512

    09e5e26e588624e95805ea06efb1ac85295efab2ebea4ecd21ef1a8b9df1ad8b67f1c78389fa543dfcc87585e53467a0db19a9211b398a7890638dc50087f328

  • SSDEEP

    3072:Wuk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxEvN8B/W6X1yxYovrepMUdQ6gSz4i:Fk3hbdlylKsgqopeJBWhZFVE+W2NdAmv

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/cc.html

Targets

    • Target

      a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d

    • Size

      128KB

    • MD5

      72d08e1daa18c52c17a0f5509f26b851

    • SHA1

      28936bbd4c5043b3e271c5ef218256158e5f46d3

    • SHA256

      a2f0339900b1bf244f4c9c36e619b0317fde876cd6597b51a37ae9d3bd544f3d

    • SHA512

      09e5e26e588624e95805ea06efb1ac85295efab2ebea4ecd21ef1a8b9df1ad8b67f1c78389fa543dfcc87585e53467a0db19a9211b398a7890638dc50087f328

    • SSDEEP

      3072:Wuk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxEvN8B/W6X1yxYovrepMUdQ6gSz4i:Fk3hbdlylKsgqopeJBWhZFVE+W2NdAmv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks