General

  • Target

    ab38de12237ce8d89c4f27fce44563d4b525fc5686ce0856257eba0632d4011b

  • Size

    102KB

  • Sample

    241120-wege2szras

  • MD5

    b94f7a34395888f5cae4e66d51c3d965

  • SHA1

    a239636ab3e2859c781d6857bcd741f8f83b0c3e

  • SHA256

    ab38de12237ce8d89c4f27fce44563d4b525fc5686ce0856257eba0632d4011b

  • SHA512

    92f202ae9d478ea96dad93b51bce2a5f5df97bdd9ba96b7af962f3c6889ef37fe9c25534011d2c646e2636c8c87859d41d2676fe5db0aa7ab3909758d31e1b02

  • SSDEEP

    3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe3.html

Targets

    • Target

      ab38de12237ce8d89c4f27fce44563d4b525fc5686ce0856257eba0632d4011b

    • Size

      102KB

    • MD5

      b94f7a34395888f5cae4e66d51c3d965

    • SHA1

      a239636ab3e2859c781d6857bcd741f8f83b0c3e

    • SHA256

      ab38de12237ce8d89c4f27fce44563d4b525fc5686ce0856257eba0632d4011b

    • SHA512

      92f202ae9d478ea96dad93b51bce2a5f5df97bdd9ba96b7af962f3c6889ef37fe9c25534011d2c646e2636c8c87859d41d2676fe5db0aa7ab3909758d31e1b02

    • SSDEEP

      3072:n/k3hbdlylKsgqopeJBWhZFGkE+cL2NdAFxe53lGvFTQ3IzxgdrvxpU0OKvMB:/k3hbdlylKsgqopeJBWhZFVE+W2NdAOK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks