General

  • Target

    a1540ebcb5b5991e567b00a80d1390c8beaa2857f8b364ab419340f63abad9e4

  • Size

    76KB

  • Sample

    241120-kznjbavka1

  • MD5

    854d9d4ef4f04ee8f17abba7c10ebebc

  • SHA1

    30894a441acef3ce04463268f0434b9553051731

  • SHA256

    a1540ebcb5b5991e567b00a80d1390c8beaa2857f8b364ab419340f63abad9e4

  • SHA512

    6f3195c033568fa2119adfac9f35a12bd58c6c7d2f81e39c6f13daf9a6a1d1d3532d643ed3ecd3fa0607bc7bed8f97daa05cfccb9996e4e3283af0db18a8d303

  • SSDEEP

    1536:xY+nBqmIk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIiQ5gQ72IotO6nitSUPU+8:xY+nBqmIk3hbdlylKsgqopeJBWhZFGkZ

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/qqw/aas/se.html

Targets

    • Target

      a1540ebcb5b5991e567b00a80d1390c8beaa2857f8b364ab419340f63abad9e4

    • Size

      76KB

    • MD5

      854d9d4ef4f04ee8f17abba7c10ebebc

    • SHA1

      30894a441acef3ce04463268f0434b9553051731

    • SHA256

      a1540ebcb5b5991e567b00a80d1390c8beaa2857f8b364ab419340f63abad9e4

    • SHA512

      6f3195c033568fa2119adfac9f35a12bd58c6c7d2f81e39c6f13daf9a6a1d1d3532d643ed3ecd3fa0607bc7bed8f97daa05cfccb9996e4e3283af0db18a8d303

    • SSDEEP

      1536:xY+nBqmIk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIiQ5gQ72IotO6nitSUPU+8:xY+nBqmIk3hbdlylKsgqopeJBWhZFGkZ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks