General
-
Target
a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2
-
Size
188KB
-
Sample
210303-bjqxty1fqa
-
MD5
ae5da20f4f221b17589dd6fc053fdc03
-
SHA1
5596c5e9eb87c1e1d7a48529bd56d9b2c576580c
-
SHA256
a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2
-
SHA512
2ce1751beea1481c942f6cb316cd9e42322e03cfd98b400b95d3ad5d95e59112fb34d45343856dec5cf284355cbf3b4babfaf7ce28139b52133d6edde0a057c8
Static task
static1
Behavioral task
behavioral1
Sample
a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
116.251.211.158:443
216.10.242.142:6601
37.247.35.137:6601
Targets
-
-
Target
a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2
-
Size
188KB
-
MD5
ae5da20f4f221b17589dd6fc053fdc03
-
SHA1
5596c5e9eb87c1e1d7a48529bd56d9b2c576580c
-
SHA256
a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2
-
SHA512
2ce1751beea1481c942f6cb316cd9e42322e03cfd98b400b95d3ad5d95e59112fb34d45343856dec5cf284355cbf3b4babfaf7ce28139b52133d6edde0a057c8
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-