General
-
Target
19415d0e4a74a56f4ac97b5cd6aefead2f3a4363b566f05290b8b274918091c4
-
Size
188KB
-
Sample
210303-mq77e6szd6
-
MD5
8a3681a11fb9f1f973ad2f43fe00aacf
-
SHA1
feb71ca3c8d7da220fd7fd4cdca811e935e7c7f7
-
SHA256
19415d0e4a74a56f4ac97b5cd6aefead2f3a4363b566f05290b8b274918091c4
-
SHA512
db402dcaf3a7389448723c1e89503ffe0bb41eb71b08fe79ac03928bf0fd5bcf42d5bb96f24c182d2a5de5fba6d8957050e86f9bb104346cb5f33bb79283116d
Static task
static1
Behavioral task
behavioral1
Sample
19415d0e4a74a56f4ac97b5cd6aefead2f3a4363b566f05290b8b274918091c4.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
116.251.211.158:443
216.10.242.142:6601
37.247.35.137:6601
Targets
-
-
Target
19415d0e4a74a56f4ac97b5cd6aefead2f3a4363b566f05290b8b274918091c4
-
Size
188KB
-
MD5
8a3681a11fb9f1f973ad2f43fe00aacf
-
SHA1
feb71ca3c8d7da220fd7fd4cdca811e935e7c7f7
-
SHA256
19415d0e4a74a56f4ac97b5cd6aefead2f3a4363b566f05290b8b274918091c4
-
SHA512
db402dcaf3a7389448723c1e89503ffe0bb41eb71b08fe79ac03928bf0fd5bcf42d5bb96f24c182d2a5de5fba6d8957050e86f9bb104346cb5f33bb79283116d
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-