General
-
Target
d990f0ad8a7c19c55e322a79ef827bea8ca97518c0a6ff47e322084ad42849eb
-
Size
188KB
-
Sample
210224-k723wz4fws
-
MD5
c99df329e362600b54a6b92211409170
-
SHA1
d400a3c475e309646d67d4de0a5561cf0d8f2135
-
SHA256
d990f0ad8a7c19c55e322a79ef827bea8ca97518c0a6ff47e322084ad42849eb
-
SHA512
3f46b6e1773da9aaf17a71f41923463787b64854ba7c46f59c34a6422bcef5e2e4d4da3861e5500123455bba8f7c8fe20a8065c2f3a30dfafb66348fce5a7ac6
Static task
static1
Behavioral task
behavioral1
Sample
d990f0ad8a7c19c55e322a79ef827bea8ca97518c0a6ff47e322084ad42849eb.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
d990f0ad8a7c19c55e322a79ef827bea8ca97518c0a6ff47e322084ad42849eb
-
Size
188KB
-
MD5
c99df329e362600b54a6b92211409170
-
SHA1
d400a3c475e309646d67d4de0a5561cf0d8f2135
-
SHA256
d990f0ad8a7c19c55e322a79ef827bea8ca97518c0a6ff47e322084ad42849eb
-
SHA512
3f46b6e1773da9aaf17a71f41923463787b64854ba7c46f59c34a6422bcef5e2e4d4da3861e5500123455bba8f7c8fe20a8065c2f3a30dfafb66348fce5a7ac6
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-