General

  • Target

    4db794a721dd54a9fa47ab0bff20d7cb444a27e0fdfdc993b39025a502391d03

  • Size

    62KB

  • Sample

    241120-rk2wqaxrbx

  • MD5

    01a1974343a2c9a2ef881199844f0aa1

  • SHA1

    eb2d80f4d9f48d91483010f2ea166358600f1578

  • SHA256

    4db794a721dd54a9fa47ab0bff20d7cb444a27e0fdfdc993b39025a502391d03

  • SHA512

    2e146dc12ac0683662059474f5b6a461ce8ebca1bdf444cd8373f5d73d970fa9c2fd9283cf5c50879fce5727c8f62371df2af472e9def648088e526851f10e2b

  • SSDEEP

    1536:8URk3hbdlylKsgqopeJBWhZFGkE+cL2NdAKNzMk9B+oo1zMk9A+oos:8Mk3hbdlylKsgqopeJBWhZFGkE+cL2N0

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://87.251.86.178/pp/cc.html

Targets

    • Target

      4db794a721dd54a9fa47ab0bff20d7cb444a27e0fdfdc993b39025a502391d03

    • Size

      62KB

    • MD5

      01a1974343a2c9a2ef881199844f0aa1

    • SHA1

      eb2d80f4d9f48d91483010f2ea166358600f1578

    • SHA256

      4db794a721dd54a9fa47ab0bff20d7cb444a27e0fdfdc993b39025a502391d03

    • SHA512

      2e146dc12ac0683662059474f5b6a461ce8ebca1bdf444cd8373f5d73d970fa9c2fd9283cf5c50879fce5727c8f62371df2af472e9def648088e526851f10e2b

    • SSDEEP

      1536:8URk3hbdlylKsgqopeJBWhZFGkE+cL2NdAKNzMk9B+oo1zMk9A+oos:8Mk3hbdlylKsgqopeJBWhZFGkE+cL2N0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks