General
-
Target
Invoice_9825272.xls
-
Size
662KB
-
Sample
210721-waayq7hsxj
-
MD5
605cc856a08688ba0aa58eb1f9ccf243
-
SHA1
a304e85596719629d143441776e4af648497cfb3
-
SHA256
9c71e9175ffedd1b7ed1a4f2fdd8c18e039ac47835c57d9afcb2749a9418875b
-
SHA512
09c14899c7286e5a64f910fbc5bc40062143b676f334deff69f20367ebef1bd9fb64bec6d59068338b969dfdb5805347a02aeaf42a70af30280b803a3e04c9aa
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_9825272.xls
Resource
win7v20210410
Malware Config
Extracted
dridex
22201
178.238.236.59:443
104.245.52.73:5007
81.0.236.93:13786
Targets
-
-
Target
Invoice_9825272.xls
-
Size
662KB
-
MD5
605cc856a08688ba0aa58eb1f9ccf243
-
SHA1
a304e85596719629d143441776e4af648497cfb3
-
SHA256
9c71e9175ffedd1b7ed1a4f2fdd8c18e039ac47835c57d9afcb2749a9418875b
-
SHA512
09c14899c7286e5a64f910fbc5bc40062143b676f334deff69f20367ebef1bd9fb64bec6d59068338b969dfdb5805347a02aeaf42a70af30280b803a3e04c9aa
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-