General
-
Target
745ec2e78f46e4708d61b0c53ff17e9e.dll
-
Size
392KB
-
Sample
201102-r2dnwybtj2
-
MD5
745ec2e78f46e4708d61b0c53ff17e9e
-
SHA1
c59243926c629ed640370e78e62ac95645f1d850
-
SHA256
98b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59
-
SHA512
2be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33
Behavioral task
behavioral1
Sample
745ec2e78f46e4708d61b0c53ff17e9e.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
10444
195.154.237.245:443
46.105.131.73:8172
91.238.160.158:18443
213.183.128.99:3786
Targets
-
-
Target
745ec2e78f46e4708d61b0c53ff17e9e.dll
-
Size
392KB
-
MD5
745ec2e78f46e4708d61b0c53ff17e9e
-
SHA1
c59243926c629ed640370e78e62ac95645f1d850
-
SHA256
98b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59
-
SHA512
2be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-