General
-
Target
37ebc1f52a70cf7877b89fdf4c06f51192868143b84e51fbb4c654ef331b4125
-
Size
496KB
-
Sample
220625-1k216afcc7
-
MD5
f217dcc188d4c3e14de50eb83f240dee
-
SHA1
d5c1344384cb867fbf5c7771956898e335c47f8a
-
SHA256
37ebc1f52a70cf7877b89fdf4c06f51192868143b84e51fbb4c654ef331b4125
-
SHA512
b6f970c33c45276a6abac302fc6367dd48bd958876583383ef830fb8adef0012fd07a854a95dd07d5d85d712e2267248c4bafdd912b49ebb450d1c191d49f861
Static task
static1
Behavioral task
behavioral1
Sample
STI_389497438854689.vbs
Resource
win7-20220414-en
Malware Config
Extracted
dridex
23.226.225.152:443
178.128.20.11:3389
198.23.146.216:8443
206.189.112.148:691
Targets
-
-
Target
STI_389497438854689.vbs
-
Size
3.0MB
-
MD5
abf6e9892c2de2d0df9dc8a80f7dd4ca
-
SHA1
026493fb163831a7b0678bc51d851dc722d61888
-
SHA256
4b4d0e3e435b94705cc1d5fc24166adf2c51d5a181a0d68d4ce63ac517f2037c
-
SHA512
237df4beefc43d8f2c38c492f2e5223ef3782e42ee47099afeee0fa9a157649899f4533a9dc697a694a6726b55982f934a33cb1167b5255e336c89859b5f366f
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-