General

  • Target

    d32a9f2a57e87ab1089d880edf6c33376daa521d275a0057f5d522a3ba2466cc

  • Size

    127KB

  • Sample

    250316-1h75dstps8

  • MD5

    c32bb23b69f7843013e669df8b2f3677

  • SHA1

    668c1483ec80f83456739d67a82096a7c4d25ccc

  • SHA256

    d32a9f2a57e87ab1089d880edf6c33376daa521d275a0057f5d522a3ba2466cc

  • SHA512

    ea83ea4f1b775fe0627f5c603d307fd9cbda47c8048bfbc6230a3456ff8663a91d7934aef36b1550dc802f2f1be695bb7f57801438a8316b789e517197e0a810

  • SSDEEP

    3072:Muk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxEvN8B/W6X1yxYovrepMUdQ6gSz4iR:Hk3hbdlylKsgqopeJBWhZFVE+W2NdAmg

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://185.7.214.7/cc.html

Targets

    • Target

      d32a9f2a57e87ab1089d880edf6c33376daa521d275a0057f5d522a3ba2466cc

    • Size

      127KB

    • MD5

      c32bb23b69f7843013e669df8b2f3677

    • SHA1

      668c1483ec80f83456739d67a82096a7c4d25ccc

    • SHA256

      d32a9f2a57e87ab1089d880edf6c33376daa521d275a0057f5d522a3ba2466cc

    • SHA512

      ea83ea4f1b775fe0627f5c603d307fd9cbda47c8048bfbc6230a3456ff8663a91d7934aef36b1550dc802f2f1be695bb7f57801438a8316b789e517197e0a810

    • SSDEEP

      3072:Muk3hbdlylKsgqopeJBWhZFGkE+cL2NdAxEvN8B/W6X1yxYovrepMUdQ6gSz4iR:Hk3hbdlylKsgqopeJBWhZFVE+W2NdAmg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks