General

  • Target

    0f502d9c5bda6dd7da36f80b951ecac88e8b582f04ead350dc877dd48c8c705f

  • Size

    84KB

  • Sample

    241120-xhpfha1new

  • MD5

    da2d1c1a6c2664e1005d0e2053d6e59f

  • SHA1

    367ee33c51ab9cff71a105ef0bc2fd71329844f6

  • SHA256

    0f502d9c5bda6dd7da36f80b951ecac88e8b582f04ead350dc877dd48c8c705f

  • SHA512

    3bdec658a2c0ad517f35b50aff04f5179790f7b8932d8aa9948bee71ed16a26fca2d88bd2d15c30a70650986b020b7e299950ee5d17f0cb9975af0afa4c15ae5

  • SSDEEP

    1536:H0k3hbdlylKsgqopeJBWhZFGkE+cMLxAAIzSEV2NnX4Ia3gg5W8IuD7PoHsP7e3/:H0k3hbdlylKsgqopeJBWhZFGkE+cMLxz

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.172/gg/ff/fe.html

Targets

    • Target

      0f502d9c5bda6dd7da36f80b951ecac88e8b582f04ead350dc877dd48c8c705f

    • Size

      84KB

    • MD5

      da2d1c1a6c2664e1005d0e2053d6e59f

    • SHA1

      367ee33c51ab9cff71a105ef0bc2fd71329844f6

    • SHA256

      0f502d9c5bda6dd7da36f80b951ecac88e8b582f04ead350dc877dd48c8c705f

    • SHA512

      3bdec658a2c0ad517f35b50aff04f5179790f7b8932d8aa9948bee71ed16a26fca2d88bd2d15c30a70650986b020b7e299950ee5d17f0cb9975af0afa4c15ae5

    • SSDEEP

      1536:H0k3hbdlylKsgqopeJBWhZFGkE+cMLxAAIzSEV2NnX4Ia3gg5W8IuD7PoHsP7e3/:H0k3hbdlylKsgqopeJBWhZFGkE+cMLxz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks