General

  • Target

    daeb3247447d0c19890e5554d0891adea600631008111ed7667350ad5191824b

  • Size

    35KB

  • Sample

    241120-zq9gratfkj

  • MD5

    90b31390af722ba0f7630391b4dc444f

  • SHA1

    017987edf27c0d95d3b490d2da79c0c76b07c602

  • SHA256

    daeb3247447d0c19890e5554d0891adea600631008111ed7667350ad5191824b

  • SHA512

    6fda46c8480a8b7e2b03c40c4c10603cff80e095a8fb4815bb1204b43c6e2ba4ed5fc8d4457a46afd7d3f8f8f5a2bbc0616bd62aecc5eed1fdbc7d84d73ed742

  • SSDEEP

    768:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJjj6ehEnmEzk:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2V

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://91.240.118.168/oo/aa/se.html

Targets

    • Target

      daeb3247447d0c19890e5554d0891adea600631008111ed7667350ad5191824b

    • Size

      35KB

    • MD5

      90b31390af722ba0f7630391b4dc444f

    • SHA1

      017987edf27c0d95d3b490d2da79c0c76b07c602

    • SHA256

      daeb3247447d0c19890e5554d0891adea600631008111ed7667350ad5191824b

    • SHA512

      6fda46c8480a8b7e2b03c40c4c10603cff80e095a8fb4815bb1204b43c6e2ba4ed5fc8d4457a46afd7d3f8f8f5a2bbc0616bd62aecc5eed1fdbc7d84d73ed742

    • SSDEEP

      768:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJjj6ehEnmEzk:f1kk3hbdlylKsgqopeJBWhZFGkE+cL2V

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks