General

  • Target

    76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e

  • Size

    76KB

  • Sample

    241120-l1ehgavnht

  • MD5

    8cc7297dda5f22780b22d5fa643b0da3

  • SHA1

    a3aa519607c9bddbdde3ed525d880172df11f43c

  • SHA256

    76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e

  • SHA512

    eb8c8cddcddea9e1f2cb70863ebfff2a23676a9bdc08440420cf1380dbbdb85625cac0e8fafd2e8f18f83e3c0d4867faf0925222e28583f47f83c887a9fb6361

  • SSDEEP

    1536:1I+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x:1I+HymsYk3hbdlylKsgqopeJBWhZFGkz

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/zzx/ccv/fe.html

Targets

    • Target

      76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e

    • Size

      76KB

    • MD5

      8cc7297dda5f22780b22d5fa643b0da3

    • SHA1

      a3aa519607c9bddbdde3ed525d880172df11f43c

    • SHA256

      76cb28484132dc02ed1731f85cc45210303742a011e43fa47fdc66165badcd6e

    • SHA512

      eb8c8cddcddea9e1f2cb70863ebfff2a23676a9bdc08440420cf1380dbbdb85625cac0e8fafd2e8f18f83e3c0d4867faf0925222e28583f47f83c887a9fb6361

    • SSDEEP

      1536:1I+Hymsbck3hbdlylKsgqopeJBWhZFGkE+cMLxAAISQ5gQ72IotO6nitSU6U+x:1I+HymsYk3hbdlylKsgqopeJBWhZFGkz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks