General

  • Target

    d0a26875a97931d0a1523e200c577ab70bd846e2c39a7708e6e02ddb176a6bd2

  • Size

    102KB

  • Sample

    241120-pf4teaweqa

  • MD5

    cb5bbc7f560ba2f7d3650d6e140d843f

  • SHA1

    b577a5bf0b48bfc6a08cb0a7485e373a13ee5d5b

  • SHA256

    d0a26875a97931d0a1523e200c577ab70bd846e2c39a7708e6e02ddb176a6bd2

  • SHA512

    4151989e65fbcf08f9e46328af242a6afc0c670b82e61a1466443a9fda264aae1d556be878a3a29675db10f357d9421a57097de58cae34802bad88c347e56d69

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      d0a26875a97931d0a1523e200c577ab70bd846e2c39a7708e6e02ddb176a6bd2

    • Size

      102KB

    • MD5

      cb5bbc7f560ba2f7d3650d6e140d843f

    • SHA1

      b577a5bf0b48bfc6a08cb0a7485e373a13ee5d5b

    • SHA256

      d0a26875a97931d0a1523e200c577ab70bd846e2c39a7708e6e02ddb176a6bd2

    • SHA512

      4151989e65fbcf08f9e46328af242a6afc0c670b82e61a1466443a9fda264aae1d556be878a3a29675db10f357d9421a57097de58cae34802bad88c347e56d69

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks