General
-
Target
265666_BOL.xlsm
-
Size
35KB
-
Sample
210315-15rwg27zde
-
MD5
a9571044e94878cf4f9799c033305fb8
-
SHA1
86429d5ad991da1773fe4f485f7eea142ab5f00a
-
SHA256
74a551c38c3165128be5e8c58766a1c57d38b7183f6c9977cd1eeadce159a00f
-
SHA512
dad015bffb5d383139f462f6b55de7e3d7844d8bbf65d9a542e41b7489e404b3d22f89508f022d97a61875ecbeeae0918b91d9023a5a5cecc69ff1fdb246bdac
Behavioral task
behavioral1
Sample
265666_BOL.xlsm
Resource
win7v20201028
Malware Config
Extracted
dridex
10444
210.65.244.184:443
147.78.186.4:10051
62.75.168.152:6601
Targets
-
-
Target
265666_BOL.xlsm
-
Size
35KB
-
MD5
a9571044e94878cf4f9799c033305fb8
-
SHA1
86429d5ad991da1773fe4f485f7eea142ab5f00a
-
SHA256
74a551c38c3165128be5e8c58766a1c57d38b7183f6c9977cd1eeadce159a00f
-
SHA512
dad015bffb5d383139f462f6b55de7e3d7844d8bbf65d9a542e41b7489e404b3d22f89508f022d97a61875ecbeeae0918b91d9023a5a5cecc69ff1fdb246bdac
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-