General
-
Target
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad
-
Size
188KB
-
Sample
210303-p1typ51zxs
-
MD5
9072fda9208770973fcd357de3fb30ab
-
SHA1
d221aa2a2b90c9cf8f62792c6092d5e5fd04442b
-
SHA256
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad
-
SHA512
3905afe1f07f55219e9b06fdb3d024d345894a3fe3cde35acd232a0b2768ed64ccfa8f84890a99ebce0913dc5395ac589a45c9bd810b2bc6b43ced369c32e1a1
Static task
static1
Behavioral task
behavioral1
Sample
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
116.251.211.158:443
216.10.242.142:6601
37.247.35.137:6601
Targets
-
-
Target
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad
-
Size
188KB
-
MD5
9072fda9208770973fcd357de3fb30ab
-
SHA1
d221aa2a2b90c9cf8f62792c6092d5e5fd04442b
-
SHA256
12e5f7b49a5065f5b234e202829efeee308314ebd7f22ad2815126398619d3ad
-
SHA512
3905afe1f07f55219e9b06fdb3d024d345894a3fe3cde35acd232a0b2768ed64ccfa8f84890a99ebce0913dc5395ac589a45c9bd810b2bc6b43ced369c32e1a1
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-