General
-
Target
yh0aj4z[1].pdf.zip
-
Size
263KB
-
Sample
201112-e66449gfaj
-
MD5
41132dd8be83afdedf51befdb5c6870e
-
SHA1
aacb327d5eb7300340284b4d1f5562a0f6083dd0
-
SHA256
b271b962d79730c73596a8881eb02727736820bb6cd8071c8d81e6d4dc7a951e
-
SHA512
08fcd24540c25b0d89e6e437e1325887e645c71a8d60d2e35fabbe04f98399190c4b9b9d2708aeeb96af964eec2729dbaf1b126e6ee1ea049e0de99fd1c9c8a5
Static task
static1
Behavioral task
behavioral1
Sample
yh0aj4z[1].pdf.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
10444
77.220.64.39:443
69.164.207.140:3388
78.47.139.43:4443
103.244.206.74:33443
Targets
-
-
Target
yh0aj4z[1].pdf
-
Size
556KB
-
MD5
ee69629c63e45daebdd031f840562b34
-
SHA1
302b7da0d9472c75869d6c48eee9fb6b652dc618
-
SHA256
d7093640c50ebce8ea387148099bb0e30c9387d2748f728f10398dfd4e365450
-
SHA512
43033b847b28c5781b65d18a8ba898a6572b5b687b46ac03318604ee9e8aad6964f723265bb1375eecc0b66a411955823540661e1e2c3da29466a060804a5419
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-