General
-
Target
c151c22bf1425d8adfa4313ee1f2387c
-
Size
532KB
-
Sample
201117-qqkfm13eta
-
MD5
6b03b4f17be0138c0dbced5e40976ea5
-
SHA1
c83f3265f0449329b27f5ff093c79e6bb480c228
-
SHA256
072e57e6e901168137834f52b2f0bfe78375258122e146f92129c2344fed0c88
-
SHA512
1a1705131cae1b9cecb669bd268a2c3481f0e0f643e5614ad6df60ddceee7e91a96aaf5be4e1d491abf0be7fc1263266f7d8a8466710d3609836019c459b21c3
Static task
static1
Behavioral task
behavioral1
Sample
c151c22bf1425d8adfa4313ee1f2387c.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
10444
77.220.64.39:443
69.164.207.140:3388
78.47.139.43:4443
103.244.206.74:33443
Targets
-
-
Target
c151c22bf1425d8adfa4313ee1f2387c
-
Size
532KB
-
MD5
6b03b4f17be0138c0dbced5e40976ea5
-
SHA1
c83f3265f0449329b27f5ff093c79e6bb480c228
-
SHA256
072e57e6e901168137834f52b2f0bfe78375258122e146f92129c2344fed0c88
-
SHA512
1a1705131cae1b9cecb669bd268a2c3481f0e0f643e5614ad6df60ddceee7e91a96aaf5be4e1d491abf0be7fc1263266f7d8a8466710d3609836019c459b21c3
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-