General
-
Target
9c3e327c612a7837cb64f76e343f08bf572dced5dbc663f2efcc4e4c9d4eb13c
-
Size
196KB
-
Sample
210303-eq8s3ww6ye
-
MD5
255fbf3507a9f3683cd2f2cce7f239ea
-
SHA1
6ab18898a66be59f9fe4c1309f4945d9220dff1b
-
SHA256
9c3e327c612a7837cb64f76e343f08bf572dced5dbc663f2efcc4e4c9d4eb13c
-
SHA512
f096c15b23ad15349dfdeebb1f7d84bf7584b0b39ff78806ba2b90e58f62493fb986d1f5dbde9d50f59171c7d60d8b6f6d53358187f020e87ccb440b917449cc
Static task
static1
Behavioral task
behavioral1
Sample
9c3e327c612a7837cb64f76e343f08bf572dced5dbc663f2efcc4e4c9d4eb13c.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
37.247.35.132:443
50.243.30.51:6601
162.241.204.234:6516
Targets
-
-
Target
9c3e327c612a7837cb64f76e343f08bf572dced5dbc663f2efcc4e4c9d4eb13c
-
Size
196KB
-
MD5
255fbf3507a9f3683cd2f2cce7f239ea
-
SHA1
6ab18898a66be59f9fe4c1309f4945d9220dff1b
-
SHA256
9c3e327c612a7837cb64f76e343f08bf572dced5dbc663f2efcc4e4c9d4eb13c
-
SHA512
f096c15b23ad15349dfdeebb1f7d84bf7584b0b39ff78806ba2b90e58f62493fb986d1f5dbde9d50f59171c7d60d8b6f6d53358187f020e87ccb440b917449cc
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-