General
-
Target
2a2d3e1bee9006855826c4a62ee664fd9d2f0b5f0bfc1c8720425596ea09e3e1
-
Size
188KB
-
Sample
210224-gg4yspjpcs
-
MD5
f53a71a487a51067b6d92c3d67293a2f
-
SHA1
82984935d526cd990af122ea431b7cc83c98d63e
-
SHA256
2a2d3e1bee9006855826c4a62ee664fd9d2f0b5f0bfc1c8720425596ea09e3e1
-
SHA512
4b4829dad6ee14425e4e58d1d15c347872fe307f31134e272a0201cbe8773d481c9c16fcbd7ee0457bfbff82bbf5b71ba98d625ad86c48ba4a49c8408a8d064c
Static task
static1
Behavioral task
behavioral1
Sample
2a2d3e1bee9006855826c4a62ee664fd9d2f0b5f0bfc1c8720425596ea09e3e1.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
2a2d3e1bee9006855826c4a62ee664fd9d2f0b5f0bfc1c8720425596ea09e3e1
-
Size
188KB
-
MD5
f53a71a487a51067b6d92c3d67293a2f
-
SHA1
82984935d526cd990af122ea431b7cc83c98d63e
-
SHA256
2a2d3e1bee9006855826c4a62ee664fd9d2f0b5f0bfc1c8720425596ea09e3e1
-
SHA512
4b4829dad6ee14425e4e58d1d15c347872fe307f31134e272a0201cbe8773d481c9c16fcbd7ee0457bfbff82bbf5b71ba98d625ad86c48ba4a49c8408a8d064c
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-