General

  • Target

    f0c4aea4446f4dfdc2892538857e5a9d72af581d234e34ee79c9cae150951e66

  • Size

    141KB

  • Sample

    241120-v92h2azdqf

  • MD5

    5f882ff9989e2ce8cbf82f03a8776b2b

  • SHA1

    45cc96bb668146c3f4269c5fcba482a77dff3ba4

  • SHA256

    f0c4aea4446f4dfdc2892538857e5a9d72af581d234e34ee79c9cae150951e66

  • SHA512

    b0db47e67659ec55b851aa86605673437805b123942c0c73af978cc9c268cc0f089e5ac34845520b1705135520bd258182df5ddec4229c6c141edff15ba35dcb

  • SSDEEP

    3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fer.html

Targets

    • Target

      f0c4aea4446f4dfdc2892538857e5a9d72af581d234e34ee79c9cae150951e66

    • Size

      141KB

    • MD5

      5f882ff9989e2ce8cbf82f03a8776b2b

    • SHA1

      45cc96bb668146c3f4269c5fcba482a77dff3ba4

    • SHA256

      f0c4aea4446f4dfdc2892538857e5a9d72af581d234e34ee79c9cae150951e66

    • SHA512

      b0db47e67659ec55b851aa86605673437805b123942c0c73af978cc9c268cc0f089e5ac34845520b1705135520bd258182df5ddec4229c6c141edff15ba35dcb

    • SSDEEP

      3072:4Rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAlhEvN8B/W6X1yxYovrepMUdQ6gSz4iq:Qk3hbdlylKsgqopeJBWhZFVE+W2NdAli

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks