General

  • Target

    3ba39a5fb0b54c012f18ece56d3765831922f5c9139c0a659d52e707faad9508

  • Size

    104KB

  • Sample

    241120-zcs8lssphv

  • MD5

    70336164a67f29ee4da72241f15f89b4

  • SHA1

    b7f86f715285aeb6fe9df6398ed5fd0d2003bfa8

  • SHA256

    3ba39a5fb0b54c012f18ece56d3765831922f5c9139c0a659d52e707faad9508

  • SHA512

    525ebbd54c584eb4cf003e814d03a7308340e59f6f79d29f6c460a0f13f65f8af8e4b28586163b62dd8595220a7091d7cf9a5069772e5d628cbae565216c29e9

  • SSDEEP

    3072:CGk3hbdlylKsgqopeJBWhZFGkE+cL2NdAydb4oifHMVhoSc2vUz3UWDG:Hk3hbdlylKsgqopeJBWhZFVE+W2NdAyu

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/qw/as/se.html

Targets

    • Target

      3ba39a5fb0b54c012f18ece56d3765831922f5c9139c0a659d52e707faad9508

    • Size

      104KB

    • MD5

      70336164a67f29ee4da72241f15f89b4

    • SHA1

      b7f86f715285aeb6fe9df6398ed5fd0d2003bfa8

    • SHA256

      3ba39a5fb0b54c012f18ece56d3765831922f5c9139c0a659d52e707faad9508

    • SHA512

      525ebbd54c584eb4cf003e814d03a7308340e59f6f79d29f6c460a0f13f65f8af8e4b28586163b62dd8595220a7091d7cf9a5069772e5d628cbae565216c29e9

    • SSDEEP

      3072:CGk3hbdlylKsgqopeJBWhZFGkE+cL2NdAydb4oifHMVhoSc2vUz3UWDG:Hk3hbdlylKsgqopeJBWhZFVE+W2NdAyu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks