General

  • Target

    0afe6310f7ba1ae69ef946e8c4e15f291f8b6ea803f156a2066645d4dc23bb14

  • Size

    101KB

  • Sample

    241120-wcehnszekd

  • MD5

    5c90822e2ddbf2ba6c0c637308ed6646

  • SHA1

    feb66ac915b16028aee34f3eae7145afcfecf48a

  • SHA256

    0afe6310f7ba1ae69ef946e8c4e15f291f8b6ea803f156a2066645d4dc23bb14

  • SHA512

    2cd0ad3a8e27242eb33c3d2cea72dbfc6a43ea432d557d08c67f80a5a79d6ac633b48a9b65615ca39950d770db6823df3e15e8d288013af1ebc2ca650018f487

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      0afe6310f7ba1ae69ef946e8c4e15f291f8b6ea803f156a2066645d4dc23bb14

    • Size

      101KB

    • MD5

      5c90822e2ddbf2ba6c0c637308ed6646

    • SHA1

      feb66ac915b16028aee34f3eae7145afcfecf48a

    • SHA256

      0afe6310f7ba1ae69ef946e8c4e15f291f8b6ea803f156a2066645d4dc23bb14

    • SHA512

      2cd0ad3a8e27242eb33c3d2cea72dbfc6a43ea432d557d08c67f80a5a79d6ac633b48a9b65615ca39950d770db6823df3e15e8d288013af1ebc2ca650018f487

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks