General

  • Target

    5326e2dc28341e5564a4da721940930d26c34d7ac6ab4e1cb79be1c4d9b4c705

  • Size

    142KB

  • Sample

    241120-vagdtazkfw

  • MD5

    72ac6dc93a66e9849a9e6d305c16b0b7

  • SHA1

    1233a7f2e82a215bf7cc452187dacd7113fafb41

  • SHA256

    5326e2dc28341e5564a4da721940930d26c34d7ac6ab4e1cb79be1c4d9b4c705

  • SHA512

    6cd69c3101515d833a26df86fc46291e71de6a49e6e59f4d1361bd99805ac7207341d02bffc33021cf62532171912592e0e757b7aa2c311066a9e3848036d2ea

  • SSDEEP

    3072:+5+nBqm9k3hbdlylKsgqopeJBWhZFGkE+cMLxAAIMEvN8B/W6X1yxYovrepMUdQm:i+nBqm9k3hbdlylKsgqopeJBWhZFVE+g

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/ve/ve.html

Targets

    • Target

      5326e2dc28341e5564a4da721940930d26c34d7ac6ab4e1cb79be1c4d9b4c705

    • Size

      142KB

    • MD5

      72ac6dc93a66e9849a9e6d305c16b0b7

    • SHA1

      1233a7f2e82a215bf7cc452187dacd7113fafb41

    • SHA256

      5326e2dc28341e5564a4da721940930d26c34d7ac6ab4e1cb79be1c4d9b4c705

    • SHA512

      6cd69c3101515d833a26df86fc46291e71de6a49e6e59f4d1361bd99805ac7207341d02bffc33021cf62532171912592e0e757b7aa2c311066a9e3848036d2ea

    • SSDEEP

      3072:+5+nBqm9k3hbdlylKsgqopeJBWhZFGkE+cMLxAAIMEvN8B/W6X1yxYovrepMUdQm:i+nBqm9k3hbdlylKsgqopeJBWhZFVE+g

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks