General

  • Target

    e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579

  • Size

    113KB

  • Sample

    241120-ygs8qswphr

  • MD5

    a9e7c90d8709f818d5c6e5c914bc4f6d

  • SHA1

    5e1091bed8a354a7e2391cb2a6d0b0821bf5a0ac

  • SHA256

    e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579

  • SHA512

    fef543109cf780a962932d8df570678dc7fcf5ffd7e0e78c0a890bd30fa34ef55cad29ebaa5280b9959f55b758239454446ff1b498ad3095aefd7412c2036567

  • SSDEEP

    3072:yW+nBqmsk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIXxe53lGvFTQ3IzxgdrvxpU0S:t+nBqmsk3hbdlylKsgqopeJBWhZFVE+S

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe5.html

Targets

    • Target

      e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579

    • Size

      113KB

    • MD5

      a9e7c90d8709f818d5c6e5c914bc4f6d

    • SHA1

      5e1091bed8a354a7e2391cb2a6d0b0821bf5a0ac

    • SHA256

      e6a99c356a6b6d7759ee7c830dffd93ab24d00d503abc2ad22e3dfc286b66579

    • SHA512

      fef543109cf780a962932d8df570678dc7fcf5ffd7e0e78c0a890bd30fa34ef55cad29ebaa5280b9959f55b758239454446ff1b498ad3095aefd7412c2036567

    • SSDEEP

      3072:yW+nBqmsk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIXxe53lGvFTQ3IzxgdrvxpU0S:t+nBqmsk3hbdlylKsgqopeJBWhZFVE+S

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks