General
-
Target
0041b2de30a67145bc4b165ed208c48cc55be7f667a4c1037f1e3e9b10139754
-
Size
188KB
-
Sample
210224-m17hc2qqdj
-
MD5
d09a01b304b9fd885d43bc26f0750e82
-
SHA1
b70bca86f4d44c11eec5b2ef3edd2f96a21c48e8
-
SHA256
0041b2de30a67145bc4b165ed208c48cc55be7f667a4c1037f1e3e9b10139754
-
SHA512
57e8a2a57b7edaa38eedda52db825ff4cc403cbe545eaacce5578fdbe503ebbcf0b395cc5b559a845baf8a16913c1f6e3fb9e9c3d79dd89553f0ffd54b9dd7a5
Static task
static1
Behavioral task
behavioral1
Sample
0041b2de30a67145bc4b165ed208c48cc55be7f667a4c1037f1e3e9b10139754.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
0041b2de30a67145bc4b165ed208c48cc55be7f667a4c1037f1e3e9b10139754
-
Size
188KB
-
MD5
d09a01b304b9fd885d43bc26f0750e82
-
SHA1
b70bca86f4d44c11eec5b2ef3edd2f96a21c48e8
-
SHA256
0041b2de30a67145bc4b165ed208c48cc55be7f667a4c1037f1e3e9b10139754
-
SHA512
57e8a2a57b7edaa38eedda52db825ff4cc403cbe545eaacce5578fdbe503ebbcf0b395cc5b559a845baf8a16913c1f6e3fb9e9c3d79dd89553f0ffd54b9dd7a5
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-