General

  • Target

    db59e01a5cdf91f3b0cbcb68d11297373230ed2453a3804b96785f2d4efe9bdc

  • Size

    102KB

  • Sample

    241120-dw4ykazape

  • MD5

    0ecc8bea252af313aba2aa4c0dd0b35a

  • SHA1

    4cba19ae58acf564f480a9153ae3384cb93c8c45

  • SHA256

    db59e01a5cdf91f3b0cbcb68d11297373230ed2453a3804b96785f2d4efe9bdc

  • SHA512

    7ffa880cf858f21e4125c6ca06a0b1da4e8e164096c567ff119ba6cc6e9afce0f7755b5ebec916d8a8749394181f74e6dabf855818e730edccb77715f3a2b7c4

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      db59e01a5cdf91f3b0cbcb68d11297373230ed2453a3804b96785f2d4efe9bdc

    • Size

      102KB

    • MD5

      0ecc8bea252af313aba2aa4c0dd0b35a

    • SHA1

      4cba19ae58acf564f480a9153ae3384cb93c8c45

    • SHA256

      db59e01a5cdf91f3b0cbcb68d11297373230ed2453a3804b96785f2d4efe9bdc

    • SHA512

      7ffa880cf858f21e4125c6ca06a0b1da4e8e164096c567ff119ba6cc6e9afce0f7755b5ebec916d8a8749394181f74e6dabf855818e730edccb77715f3a2b7c4

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks