General
-
Target
8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7
-
Size
188KB
-
Sample
210224-1538y3ka1j
-
MD5
978c71c05e5ed7d1387e1219d42152dd
-
SHA1
f29688f11a63d374520acfa5d10db7da8da661ad
-
SHA256
8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7
-
SHA512
9c2af417b85f6437d77ac6aa65aa6e10c626d1865805d5576c94b0e50c3b47ad4bf2677cd80bb31ea87c136253e8ece75419a0639f91a8a124c5c7b269fe295d
Static task
static1
Behavioral task
behavioral1
Sample
8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7
-
Size
188KB
-
MD5
978c71c05e5ed7d1387e1219d42152dd
-
SHA1
f29688f11a63d374520acfa5d10db7da8da661ad
-
SHA256
8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7
-
SHA512
9c2af417b85f6437d77ac6aa65aa6e10c626d1865805d5576c94b0e50c3b47ad4bf2677cd80bb31ea87c136253e8ece75419a0639f91a8a124c5c7b269fe295d
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-