General
-
Target
Information_219488309.doc
-
Size
234KB
-
Sample
201028-5zh59bj3de
-
MD5
ee1d7753232b3855e6f631359d6bdd8b
-
SHA1
ad5b90796f39c016328c90647d47a3f96334843a
-
SHA256
59b1087ec423c56cba3ca5ef050b8f86a9fb22ddddcf096ca6d92363efaabe2f
-
SHA512
f86179dc671ad87370370533a7924e27ea2211e5f03fe37653d2b3eab83c514f3a54dfe4697590b684d6314ab727f7aedeb5f98d3dfedfddb620522fbc4e26af
Static task
static1
Behavioral task
behavioral1
Sample
Information_219488309.doc
Resource
win7
Malware Config
Extracted
http://custom.robi2.hu/r0779g.zip
https://cisrs.in/home4/myclonr9/cisrs.in/resources//qcthkrzo.pdf
http://b15.robi2.hu/bznqxuny1.zip
https://puzzle.altosaxplayer.com/c1ycpxxxc.zip
http://mayhutchankhong.tv/ug6utpv39
Extracted
dridex
10555
85.207.13.169:443
74.207.242.13:1688
176.58.101.200:49160
164.132.75.129:3388
Targets
-
-
Target
Information_219488309.doc
-
Size
234KB
-
MD5
ee1d7753232b3855e6f631359d6bdd8b
-
SHA1
ad5b90796f39c016328c90647d47a3f96334843a
-
SHA256
59b1087ec423c56cba3ca5ef050b8f86a9fb22ddddcf096ca6d92363efaabe2f
-
SHA512
f86179dc671ad87370370533a7924e27ea2211e5f03fe37653d2b3eab83c514f3a54dfe4697590b684d6314ab727f7aedeb5f98d3dfedfddb620522fbc4e26af
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-