General
-
Target
Contract 30964.xls
-
Size
727KB
-
Sample
210114-8jl43x3vrx
-
MD5
c84236e6997a25861e15d5d44a7d207e
-
SHA1
f4b0cad4dfa47c8ce6feaaeea3ee3ef79708ffe5
-
SHA256
4b365dadb8a5d68b5ff999a1b5991aa0cad00852e0ed7517c4748ecc5f402558
-
SHA512
ca35ae9393899391a9593d2f0c94d04314c267c4385fd96b06776c066cfa3bc42db6c348a622349cbc4315352fb63213c105c47a9c198f417b898bddf8105058
Static task
static1
Behavioral task
behavioral1
Sample
Contract 30964.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Contract 30964.xls
Resource
win10v20201028
Malware Config
Extracted
dridex
111
52.73.70.149:443
8.4.9.152:3786
185.246.87.202:3098
50.116.111.64:5353
Targets
-
-
Target
Contract 30964.xls
-
Size
727KB
-
MD5
c84236e6997a25861e15d5d44a7d207e
-
SHA1
f4b0cad4dfa47c8ce6feaaeea3ee3ef79708ffe5
-
SHA256
4b365dadb8a5d68b5ff999a1b5991aa0cad00852e0ed7517c4748ecc5f402558
-
SHA512
ca35ae9393899391a9593d2f0c94d04314c267c4385fd96b06776c066cfa3bc42db6c348a622349cbc4315352fb63213c105c47a9c198f417b898bddf8105058
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
JavaScript code in executable
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-