General

  • Target

    4a11fc3171835a6afc00ef51c5bc3014ee77688c3aa9f94228cd0c0c300bb023

  • Size

    64KB

  • Sample

    241120-259r6svfke

  • MD5

    3c0713729a618813a180b8f38e669d30

  • SHA1

    04cc90dfa13f79366e6ff15067a211fc02bba995

  • SHA256

    4a11fc3171835a6afc00ef51c5bc3014ee77688c3aa9f94228cd0c0c300bb023

  • SHA512

    8c3881d47e1a1a00df7181f44c86b9595c986f5a99f98e81b82ca8c41030d00648158b6b7c629b33f94a3feccb767c39a6f2ec402969af2ec4c894f42acee315

  • SSDEEP

    1536:d0Nk3hbdlylKsgqopeJBWhZFGkE+cL2NdAKzMk9B+ooszMk9A+oos:dak3hbdlylKsgqopeJBWhZFGkE+cL2NP

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://87.251.86.178/pp/oo.html

Targets

    • Target

      4a11fc3171835a6afc00ef51c5bc3014ee77688c3aa9f94228cd0c0c300bb023

    • Size

      64KB

    • MD5

      3c0713729a618813a180b8f38e669d30

    • SHA1

      04cc90dfa13f79366e6ff15067a211fc02bba995

    • SHA256

      4a11fc3171835a6afc00ef51c5bc3014ee77688c3aa9f94228cd0c0c300bb023

    • SHA512

      8c3881d47e1a1a00df7181f44c86b9595c986f5a99f98e81b82ca8c41030d00648158b6b7c629b33f94a3feccb767c39a6f2ec402969af2ec4c894f42acee315

    • SSDEEP

      1536:d0Nk3hbdlylKsgqopeJBWhZFGkE+cL2NdAKzMk9B+ooszMk9A+oos:dak3hbdlylKsgqopeJBWhZFGkE+cL2NP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks