General
-
Target
921e5238a62b3122d0c95521b633de0ea44e54403ab8529fdbc9af99f611064a
-
Size
188KB
-
Sample
210224-jfgyxdw4xj
-
MD5
2bc3dfc7ffca3d969b16b08acd3bdd33
-
SHA1
00317e4ca76f80f2cc85ea61b0c97c2c39e781b8
-
SHA256
921e5238a62b3122d0c95521b633de0ea44e54403ab8529fdbc9af99f611064a
-
SHA512
346a5e53730fa5dfca2d6101d6d1a6cf4c260ec9ef421722176c5caf79803affb91b28f07d5c500cd6f80f1353c099834428c6f257c9ae7b7dc616b3aa28bd43
Static task
static1
Behavioral task
behavioral1
Sample
921e5238a62b3122d0c95521b633de0ea44e54403ab8529fdbc9af99f611064a.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
921e5238a62b3122d0c95521b633de0ea44e54403ab8529fdbc9af99f611064a
-
Size
188KB
-
MD5
2bc3dfc7ffca3d969b16b08acd3bdd33
-
SHA1
00317e4ca76f80f2cc85ea61b0c97c2c39e781b8
-
SHA256
921e5238a62b3122d0c95521b633de0ea44e54403ab8529fdbc9af99f611064a
-
SHA512
346a5e53730fa5dfca2d6101d6d1a6cf4c260ec9ef421722176c5caf79803affb91b28f07d5c500cd6f80f1353c099834428c6f257c9ae7b7dc616b3aa28bd43
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-