General

  • Target

    02db686e0df1d12f25da7e841b48d47d6cdcd52e4c7f68b48155265b19020ebb

  • Size

    107KB

  • Sample

    241121-arwjvawqft

  • MD5

    fd86ecc9240f42bf24010b822344b210

  • SHA1

    390dd835d292fff13d2ade930c4704c242846ec4

  • SHA256

    02db686e0df1d12f25da7e841b48d47d6cdcd52e4c7f68b48155265b19020ebb

  • SHA512

    cade3602a81a1d7a50851eb70e422b16aba28bd1cc5868668e3a98c4653288b71a21a0ba8ac8cf0a878ed562c3907d73bf2f70b2c25de679839dc31865743adc

  • SSDEEP

    3072:+C+nBqmxk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIFxe53lGvFTQ3IzxgdrvxpU0O:R+nBqmxk3hbdlylKsgqopeJBWhZFVE+s

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/fer/fe4.html

Targets

    • Target

      02db686e0df1d12f25da7e841b48d47d6cdcd52e4c7f68b48155265b19020ebb

    • Size

      107KB

    • MD5

      fd86ecc9240f42bf24010b822344b210

    • SHA1

      390dd835d292fff13d2ade930c4704c242846ec4

    • SHA256

      02db686e0df1d12f25da7e841b48d47d6cdcd52e4c7f68b48155265b19020ebb

    • SHA512

      cade3602a81a1d7a50851eb70e422b16aba28bd1cc5868668e3a98c4653288b71a21a0ba8ac8cf0a878ed562c3907d73bf2f70b2c25de679839dc31865743adc

    • SSDEEP

      3072:+C+nBqmxk3hbdlylKsgqopeJBWhZFGkE+cMLxAAIFxe53lGvFTQ3IzxgdrvxpU0O:R+nBqmxk3hbdlylKsgqopeJBWhZFVE+s

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks