General
-
Target
Information-822908953.doc
-
Size
117KB
-
Sample
201120-npy8159bfx
-
MD5
59b5d3179a962efa890e2df17aaf31d1
-
SHA1
52b0231b64030049d61096bd2bb872ab89ac7e55
-
SHA256
d2bc5e480daba7368064d7de34a53077e968dafc86084c87191c5c3d2fb7c444
-
SHA512
4bbb5fbd99e9ae35f690dcc710d8ba168cf5361fd4857f5b9b341185834a9d1e19f641a47cf6ea18366d6f2d13e1ce457b53c12f9264b9da5fe38d02b1a29432
Static task
static1
Behavioral task
behavioral1
Sample
Information-822908953.doc
Resource
win7v20201028
Malware Config
Extracted
http://veva.vn/zntk070.png
http://hardmed-eg.com/o76nxa.png
http://islamabout.com/ga140h7l.zip
http://ferretec.com/c2eivsswg.rar
http://rasadbar.ir/t6yswb.pdf
http://seniorcarecompass.inifaresworkshops.com/vr6ebzold.png
Extracted
dridex
10555
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
Targets
-
-
Target
Information-822908953.doc
-
Size
117KB
-
MD5
59b5d3179a962efa890e2df17aaf31d1
-
SHA1
52b0231b64030049d61096bd2bb872ab89ac7e55
-
SHA256
d2bc5e480daba7368064d7de34a53077e968dafc86084c87191c5c3d2fb7c444
-
SHA512
4bbb5fbd99e9ae35f690dcc710d8ba168cf5361fd4857f5b9b341185834a9d1e19f641a47cf6ea18366d6f2d13e1ce457b53c12f9264b9da5fe38d02b1a29432
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-