General
-
Target
d3e4a34d13bbfccea5715e95b34c4b2a61b9c920752865add848cd43eac04869
-
Size
184KB
-
Sample
210223-jgm4mtcyw6
-
MD5
5f5a92d0ecb1527fff45ea4a88f2802d
-
SHA1
c90e5c7df3e09450fa1925240731dc3c174de680
-
SHA256
d3e4a34d13bbfccea5715e95b34c4b2a61b9c920752865add848cd43eac04869
-
SHA512
a3fea1a333233655548b6765955ec6cc591fbfb805e930a46b572f59a852626fc6ef3686c210a5b180d3f46c1b327777386f930669411f5f0920f5306b9eed96
Static task
static1
Behavioral task
behavioral1
Sample
d3e4a34d13bbfccea5715e95b34c4b2a61b9c920752865add848cd43eac04869.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
162.13.114.59:443
70.39.99.196:8172
37.187.115.122:6601
Targets
-
-
Target
d3e4a34d13bbfccea5715e95b34c4b2a61b9c920752865add848cd43eac04869
-
Size
184KB
-
MD5
5f5a92d0ecb1527fff45ea4a88f2802d
-
SHA1
c90e5c7df3e09450fa1925240731dc3c174de680
-
SHA256
d3e4a34d13bbfccea5715e95b34c4b2a61b9c920752865add848cd43eac04869
-
SHA512
a3fea1a333233655548b6765955ec6cc591fbfb805e930a46b572f59a852626fc6ef3686c210a5b180d3f46c1b327777386f930669411f5f0920f5306b9eed96
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-