General
-
Target
bd37232c2ec9e70b50f0cfee7260cb84c311ba2dbd8e789cfac3bc229b1b6ea0
-
Size
188KB
-
Sample
210303-nr6g2ag6t2
-
MD5
11a01926899f14d0949405c71b0f6146
-
SHA1
d075ad0c7cc871d40aca2bf1fa6db034547ced3a
-
SHA256
bd37232c2ec9e70b50f0cfee7260cb84c311ba2dbd8e789cfac3bc229b1b6ea0
-
SHA512
675928d88feac1780182fdc45cb9e35f002a1787d0aa93b7b5f93e675ffad55ef4fd0ae7a189a14ad5cbc1017735150698649534ed6f2300577834cc9945e9b4
Static task
static1
Behavioral task
behavioral1
Sample
bd37232c2ec9e70b50f0cfee7260cb84c311ba2dbd8e789cfac3bc229b1b6ea0.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
116.251.211.158:443
216.10.242.142:6601
37.247.35.137:6601
Targets
-
-
Target
bd37232c2ec9e70b50f0cfee7260cb84c311ba2dbd8e789cfac3bc229b1b6ea0
-
Size
188KB
-
MD5
11a01926899f14d0949405c71b0f6146
-
SHA1
d075ad0c7cc871d40aca2bf1fa6db034547ced3a
-
SHA256
bd37232c2ec9e70b50f0cfee7260cb84c311ba2dbd8e789cfac3bc229b1b6ea0
-
SHA512
675928d88feac1780182fdc45cb9e35f002a1787d0aa93b7b5f93e675ffad55ef4fd0ae7a189a14ad5cbc1017735150698649534ed6f2300577834cc9945e9b4
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-