General
-
Target
Documentation.478396766.doc
-
Size
116KB
-
Sample
201119-3z863g7932
-
MD5
e12004b1f374e47e4e63797096854321
-
SHA1
b3c2d856499174992dc5c13738991875bc9cc08c
-
SHA256
8921b2421d4fde9e229bdda0da89a5bd10023a9f9d2529f2fb2da9c5e1a060c6
-
SHA512
4e40379df93194528cb7de413861b0b1416b5d2adc6232b2cf101e18fba06843e481101f3ef651590e06a140348ace0a321b1a0639f389b5a93298d55c21c3c2
Static task
static1
Behavioral task
behavioral1
Sample
Documentation.478396766.doc
Resource
win7v20201028
Malware Config
Extracted
http://veva.vn/zntk070.png
http://hardmed-eg.com/o76nxa.png
http://islamabout.com/ga140h7l.zip
http://ferretec.com/c2eivsswg.rar
http://rasadbar.ir/t6yswb.pdf
http://seniorcarecompass.inifaresworkshops.com/vr6ebzold.png
Extracted
dridex
10555
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
Targets
-
-
Target
Documentation.478396766.doc
-
Size
116KB
-
MD5
e12004b1f374e47e4e63797096854321
-
SHA1
b3c2d856499174992dc5c13738991875bc9cc08c
-
SHA256
8921b2421d4fde9e229bdda0da89a5bd10023a9f9d2529f2fb2da9c5e1a060c6
-
SHA512
4e40379df93194528cb7de413861b0b1416b5d2adc6232b2cf101e18fba06843e481101f3ef651590e06a140348ace0a321b1a0639f389b5a93298d55c21c3c2
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-