General

  • Target

    8fe0538bd7c48a1e25e5ad929e0bce63ea1a1c254d0c0a0f8881a6a0f71c0278

  • Size

    101KB

  • Sample

    241120-lz35fazleq

  • MD5

    ddbf0b8ddfbe788f039e0cddabfe358c

  • SHA1

    e7f149d328647952753919d9cab613a27880cd8d

  • SHA256

    8fe0538bd7c48a1e25e5ad929e0bce63ea1a1c254d0c0a0f8881a6a0f71c0278

  • SHA512

    1b7663d9bd9f70054b519ca67df0cd3eb0f23f47bc4e8c9c28116d43cfd9da8fea2af207b9d83f6ac4dad4d99bcd0d8e78e2fbbeb46eca4b182a831d4f336317

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      8fe0538bd7c48a1e25e5ad929e0bce63ea1a1c254d0c0a0f8881a6a0f71c0278

    • Size

      101KB

    • MD5

      ddbf0b8ddfbe788f039e0cddabfe358c

    • SHA1

      e7f149d328647952753919d9cab613a27880cd8d

    • SHA256

      8fe0538bd7c48a1e25e5ad929e0bce63ea1a1c254d0c0a0f8881a6a0f71c0278

    • SHA512

      1b7663d9bd9f70054b519ca67df0cd3eb0f23f47bc4e8c9c28116d43cfd9da8fea2af207b9d83f6ac4dad4d99bcd0d8e78e2fbbeb46eca4b182a831d4f336317

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks