General

  • Target

    aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825

  • Size

    142KB

  • Sample

    241120-pdg7mawelc

  • MD5

    a1dd00cea711f5908071a51f80af933c

  • SHA1

    bbbf2e794c8de4dd7dcec1076263528f7a6f0105

  • SHA256

    aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825

  • SHA512

    b9b902f66e5c8b900e186d75fce0c1ca1a091118411dff7e463219a1194434f3794552146122583cc8003d9685e62dcced2c608e16d8f977d4e16053043b1d7b

  • SSDEEP

    3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fer.html

Targets

    • Target

      aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825

    • Size

      142KB

    • MD5

      a1dd00cea711f5908071a51f80af933c

    • SHA1

      bbbf2e794c8de4dd7dcec1076263528f7a6f0105

    • SHA256

      aacf84eae39e69f30102eb3bd92a25231fd6a4aa5383e3cb1576234b6764b825

    • SHA512

      b9b902f66e5c8b900e186d75fce0c1ca1a091118411dff7e463219a1194434f3794552146122583cc8003d9685e62dcced2c608e16d8f977d4e16053043b1d7b

    • SSDEEP

      3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks