General
-
Target
Order_Gift_Card_411022863.doc
-
Size
112KB
-
Sample
201126-b1lvw4dgca
-
MD5
07faf71908158870c1e1af97bd89d12d
-
SHA1
567052f0b8b453932db3e18208990bca12bcc167
-
SHA256
255327cc966eebcdb52f94414c36920585f2190ae10a9560db5047def717b2ac
-
SHA512
3acc7099c87cfb54abf823b00839a3c928ae853cf6c83c19bc29a79af4fca45a573f88ac4b60f83698aed718b443d0ec3ac130954b5d0fb71e239b76da6e414d
Static task
static1
Behavioral task
behavioral1
Sample
Order_Gift_Card_411022863.doc
Resource
win7v20201028
Malware Config
Extracted
https://burstner.clabris.se/ucjk7st.zip
http://bespokeweddings.ie/k1c8dh4.rar
https://conjurosdeamoryhechiceriaacacio.com/tjbdhdvi1.zip
https://keitauniv.keita.ae/wchfvdsd7.rar
https://cms.keita.ae/h0mqrz.rar
https://airbornegroup.net/y461xrm.zip
https://phones.pmrspain.com/xzeoxn8.rar
http://oya.qa/lfonl5.rar
Extracted
dridex
10555
194.225.58.216:443
178.254.40.132:691
216.172.165.70:3889
198.57.200.100:3786
Targets
-
-
Target
Order_Gift_Card_411022863.doc
-
Size
112KB
-
MD5
07faf71908158870c1e1af97bd89d12d
-
SHA1
567052f0b8b453932db3e18208990bca12bcc167
-
SHA256
255327cc966eebcdb52f94414c36920585f2190ae10a9560db5047def717b2ac
-
SHA512
3acc7099c87cfb54abf823b00839a3c928ae853cf6c83c19bc29a79af4fca45a573f88ac4b60f83698aed718b443d0ec3ac130954b5d0fb71e239b76da6e414d
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-