General

  • Target

    37675c7b8c206210e680e7f1e4906fd9565c7fcf0f92af9633bd5517944bb7df

  • Size

    70KB

  • Sample

    241120-s637caypds

  • MD5

    ec69dd36d403ff935e21af4b23295271

  • SHA1

    2543243d16a989808026a0932597667b552360c4

  • SHA256

    37675c7b8c206210e680e7f1e4906fd9565c7fcf0f92af9633bd5517944bb7df

  • SHA512

    e37ef580741746d929456ab19d44c1ce9ed928227ad0c2618a61882cfd5ce7c069e3a74568e2a6496aa0c88942c9cd7b4c1a36d96cca817c238a2d78fa05861d

  • SSDEEP

    1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe2.html

Targets

    • Target

      37675c7b8c206210e680e7f1e4906fd9565c7fcf0f92af9633bd5517944bb7df

    • Size

      70KB

    • MD5

      ec69dd36d403ff935e21af4b23295271

    • SHA1

      2543243d16a989808026a0932597667b552360c4

    • SHA256

      37675c7b8c206210e680e7f1e4906fd9565c7fcf0f92af9633bd5517944bb7df

    • SHA512

      e37ef580741746d929456ab19d44c1ce9ed928227ad0c2618a61882cfd5ce7c069e3a74568e2a6496aa0c88942c9cd7b4c1a36d96cca817c238a2d78fa05861d

    • SSDEEP

      1536:bpEk3hbdlylKsgqopeJBWhZFGkE+cL2NdA8eXZiozeOgXVZKyaZpvyR1kZkJvU+:bCk3hbdlylKsgqopeJBWhZFGkE+cL2Nr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks