General

  • Target

    cac581b4bda94e49527906ad4d59a4fd545d037efbf0c8fbe825b880ba016e1c

  • Size

    102KB

  • Sample

    241120-d62aesvlgm

  • MD5

    17924b188299448dce956a5e6599e473

  • SHA1

    0019c8a740f14a00d88146b2747b2809cb448962

  • SHA256

    cac581b4bda94e49527906ad4d59a4fd545d037efbf0c8fbe825b880ba016e1c

  • SHA512

    a562adcd03e51a5244a4abfc38e249cea982a1955792a3d85f27635cd01ff5df50701f04e7d60c2fe44814fe8788a5d8d88fd257798b06df1f01a496fb7bfee6

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      cac581b4bda94e49527906ad4d59a4fd545d037efbf0c8fbe825b880ba016e1c

    • Size

      102KB

    • MD5

      17924b188299448dce956a5e6599e473

    • SHA1

      0019c8a740f14a00d88146b2747b2809cb448962

    • SHA256

      cac581b4bda94e49527906ad4d59a4fd545d037efbf0c8fbe825b880ba016e1c

    • SHA512

      a562adcd03e51a5244a4abfc38e249cea982a1955792a3d85f27635cd01ff5df50701f04e7d60c2fe44814fe8788a5d8d88fd257798b06df1f01a496fb7bfee6

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks