General
-
Target
0bcaa3a31fb598a27437bb294a6e34ce138fc3e65adbff2ca7a13799547cd76a
-
Size
188KB
-
Sample
210303-p4j27zqz3a
-
MD5
c8ed2da280428b796645d8e090708408
-
SHA1
86b6a23a5b1217ba6782b0f7f36d903f474057b1
-
SHA256
0bcaa3a31fb598a27437bb294a6e34ce138fc3e65adbff2ca7a13799547cd76a
-
SHA512
b258bfbc13fa25886ede98a3e69d9a3edfb2f49f0d4ff3c279c5cb6a37d4fc88ad58c7fbdb6005b488a6002220a127d45f6e83b796d3154a936e10edf183b93f
Static task
static1
Behavioral task
behavioral1
Sample
0bcaa3a31fb598a27437bb294a6e34ce138fc3e65adbff2ca7a13799547cd76a.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
116.251.211.158:443
216.10.242.142:6601
37.247.35.137:6601
Targets
-
-
Target
0bcaa3a31fb598a27437bb294a6e34ce138fc3e65adbff2ca7a13799547cd76a
-
Size
188KB
-
MD5
c8ed2da280428b796645d8e090708408
-
SHA1
86b6a23a5b1217ba6782b0f7f36d903f474057b1
-
SHA256
0bcaa3a31fb598a27437bb294a6e34ce138fc3e65adbff2ca7a13799547cd76a
-
SHA512
b258bfbc13fa25886ede98a3e69d9a3edfb2f49f0d4ff3c279c5cb6a37d4fc88ad58c7fbdb6005b488a6002220a127d45f6e83b796d3154a936e10edf183b93f
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-