General
-
Target
15d1252024d046b76737f80017b31b5e
-
Size
371KB
-
Sample
210721-e8hxrqr3ta
-
MD5
15d1252024d046b76737f80017b31b5e
-
SHA1
9d61edbf4819eb9ee8e6de03120ee06e1a8b592e
-
SHA256
4a8c152ef7c7e3ced93e8629691f6f66bb67f78c4e17caf0198db18300b19acf
-
SHA512
8f2819cfe537ba891ddc49d3eca12d2cb80c20a270e307822e5e79e2c1c246ad3a1099a1720d2ea9a3f0d6ab630e8bafd93a746f2267b888e3e61c9ee3289179
Static task
static1
Behavioral task
behavioral1
Sample
15d1252024d046b76737f80017b31b5e.xls
Resource
win7v20210408
Malware Config
Extracted
dridex
22202
178.238.236.59:443
104.245.52.73:5007
81.0.236.93:13786
Targets
-
-
Target
15d1252024d046b76737f80017b31b5e
-
Size
371KB
-
MD5
15d1252024d046b76737f80017b31b5e
-
SHA1
9d61edbf4819eb9ee8e6de03120ee06e1a8b592e
-
SHA256
4a8c152ef7c7e3ced93e8629691f6f66bb67f78c4e17caf0198db18300b19acf
-
SHA512
8f2819cfe537ba891ddc49d3eca12d2cb80c20a270e307822e5e79e2c1c246ad3a1099a1720d2ea9a3f0d6ab630e8bafd93a746f2267b888e3e61c9ee3289179
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-