General
-
Target
72c92747969674e130c86264ca33e490df9d6dd9e4c815740511db8a4ff92728
-
Size
188KB
-
Sample
210224-p5xzhdkgv6
-
MD5
4f34340f7cfc5e80eb584e80c19763b2
-
SHA1
090e292f96d0682e3d18ca8e69ed417878d0add0
-
SHA256
72c92747969674e130c86264ca33e490df9d6dd9e4c815740511db8a4ff92728
-
SHA512
e9fc105559e47ff560edb2437bd9c97ea9dcaa8c32638f0b47e1c2e46a5309c4f0a327861ea07b2e9b98012b75cfc0d1c4bf41565e3c8dcc278a288f938fee3c
Static task
static1
Behavioral task
behavioral1
Sample
72c92747969674e130c86264ca33e490df9d6dd9e4c815740511db8a4ff92728.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
72c92747969674e130c86264ca33e490df9d6dd9e4c815740511db8a4ff92728
-
Size
188KB
-
MD5
4f34340f7cfc5e80eb584e80c19763b2
-
SHA1
090e292f96d0682e3d18ca8e69ed417878d0add0
-
SHA256
72c92747969674e130c86264ca33e490df9d6dd9e4c815740511db8a4ff92728
-
SHA512
e9fc105559e47ff560edb2437bd9c97ea9dcaa8c32638f0b47e1c2e46a5309c4f0a327861ea07b2e9b98012b75cfc0d1c4bf41565e3c8dcc278a288f938fee3c
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-