General
-
Target
Inv 4529.xls
-
Size
793KB
-
Sample
210114-tvgx7zpg8s
-
MD5
8db799f159631efb77a2d8c7c0099399
-
SHA1
8f202b18d37b68a26d53a64cc6c4b7b127c6c94b
-
SHA256
4d13b0dda7b538ae90a79ac5bbb872f3aba6fd798c2900c4580bc59ae8623b1f
-
SHA512
78506c8a91f09a98f015462b3a88ee1c08552bb2a396a1103106a4b71438633a52a6315c50700c229e5775fb9b87f3201ccda9a9b7a4d67e906a5c6bc7ff3bcc
Static task
static1
Behavioral task
behavioral1
Sample
Inv 4529.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Inv 4529.xls
Resource
win10v20201028
Malware Config
Extracted
dridex
111
52.73.70.149:443
8.4.9.152:3786
185.246.87.202:3098
50.116.111.64:5353
Targets
-
-
Target
Inv 4529.xls
-
Size
793KB
-
MD5
8db799f159631efb77a2d8c7c0099399
-
SHA1
8f202b18d37b68a26d53a64cc6c4b7b127c6c94b
-
SHA256
4d13b0dda7b538ae90a79ac5bbb872f3aba6fd798c2900c4580bc59ae8623b1f
-
SHA512
78506c8a91f09a98f015462b3a88ee1c08552bb2a396a1103106a4b71438633a52a6315c50700c229e5775fb9b87f3201ccda9a9b7a4d67e906a5c6bc7ff3bcc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
JavaScript code in executable
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-