General
-
Target
55ba4fd13d72f62d19c69be0026b3d62882f067611c6fdf609b0fa723c8cb1ed
-
Size
188KB
-
Sample
210224-wb9g218f3s
-
MD5
c48e8c8d2a588c9dac2b2cae7e46f344
-
SHA1
3abe177acbd476f059036c41ce98e37fff7451e8
-
SHA256
55ba4fd13d72f62d19c69be0026b3d62882f067611c6fdf609b0fa723c8cb1ed
-
SHA512
41701d540cc77cc0a71626ebc2a4348526c7786eb8c87ea8ff24f899d5858db01d120ff98e777d7c171fdc52b4ab00e1e138ef6e496796efdcc79268cfda5abe
Static task
static1
Behavioral task
behavioral1
Sample
55ba4fd13d72f62d19c69be0026b3d62882f067611c6fdf609b0fa723c8cb1ed.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
209.151.236.42:443
91.121.94.86:8172
5.189.144.136:6516
Targets
-
-
Target
55ba4fd13d72f62d19c69be0026b3d62882f067611c6fdf609b0fa723c8cb1ed
-
Size
188KB
-
MD5
c48e8c8d2a588c9dac2b2cae7e46f344
-
SHA1
3abe177acbd476f059036c41ce98e37fff7451e8
-
SHA256
55ba4fd13d72f62d19c69be0026b3d62882f067611c6fdf609b0fa723c8cb1ed
-
SHA512
41701d540cc77cc0a71626ebc2a4348526c7786eb8c87ea8ff24f899d5858db01d120ff98e777d7c171fdc52b4ab00e1e138ef6e496796efdcc79268cfda5abe
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-