General
-
Target
bd59e42a9ee00ba415448c31190e57d7.xls
-
Size
317KB
-
Sample
210721-vxzsmwm3ra
-
MD5
bd59e42a9ee00ba415448c31190e57d7
-
SHA1
95bc249a25513514f1859b690fdcc41f7fb78bac
-
SHA256
f4f0127923c4a1c69aab04516907fd4010f9af8302e132b972d053813577b18d
-
SHA512
aad6ecac040ef20c61aee790155adc1937e426c3ef2240334516ed6be26c4688f764cec8cd0c051710ef35d261fc6b789d408bf6755e0714affce101603bfdca
Static task
static1
Behavioral task
behavioral1
Sample
bd59e42a9ee00ba415448c31190e57d7.xls
Resource
win7v20210410
Malware Config
Extracted
dridex
22202
178.238.236.59:443
104.245.52.73:5007
81.0.236.93:13786
Targets
-
-
Target
bd59e42a9ee00ba415448c31190e57d7.xls
-
Size
317KB
-
MD5
bd59e42a9ee00ba415448c31190e57d7
-
SHA1
95bc249a25513514f1859b690fdcc41f7fb78bac
-
SHA256
f4f0127923c4a1c69aab04516907fd4010f9af8302e132b972d053813577b18d
-
SHA512
aad6ecac040ef20c61aee790155adc1937e426c3ef2240334516ed6be26c4688f764cec8cd0c051710ef35d261fc6b789d408bf6755e0714affce101603bfdca
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-