General

  • Target

    e1f3695a995bac12ea86c1386facebd53140f1126961897635bcd47f500e7a01

  • Size

    101KB

  • Sample

    241120-vsxthsvkbl

  • MD5

    966af2aa93158d66849a869e4b636026

  • SHA1

    84044cf30ae5ae7ea90b7f529048be2582a7941f

  • SHA256

    e1f3695a995bac12ea86c1386facebd53140f1126961897635bcd47f500e7a01

  • SHA512

    3ee6b8add4d73cacfec052d9cc91a8b4158aac72bd1c18fea5e8c4f32bf8e85d1634341f5862f6411f6dcace09eafa53ed29e57811253d10da9ef0619795451d

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      e1f3695a995bac12ea86c1386facebd53140f1126961897635bcd47f500e7a01

    • Size

      101KB

    • MD5

      966af2aa93158d66849a869e4b636026

    • SHA1

      84044cf30ae5ae7ea90b7f529048be2582a7941f

    • SHA256

      e1f3695a995bac12ea86c1386facebd53140f1126961897635bcd47f500e7a01

    • SHA512

      3ee6b8add4d73cacfec052d9cc91a8b4158aac72bd1c18fea5e8c4f32bf8e85d1634341f5862f6411f6dcace09eafa53ed29e57811253d10da9ef0619795451d

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks