General
-
Target
c6784abd48dc7e4cbaf9387e2feb04132482412051b7df24f06d4860234107ad
-
Size
196KB
-
Sample
210304-33ykhesbqs
-
MD5
8440469645ebb3770dc1ccd744bb44c6
-
SHA1
5b1e7f3792c1b2214e317d2d060884b3c6d6194e
-
SHA256
c6784abd48dc7e4cbaf9387e2feb04132482412051b7df24f06d4860234107ad
-
SHA512
115bd9b2c695b579fea66eb3f133b3a98e5c2e49ad0a356216cc464f27f56572daec6505b38d465cb98f3c8f41272585f49b921f8a1905cda59140435ed89fb0
Static task
static1
Behavioral task
behavioral1
Sample
c6784abd48dc7e4cbaf9387e2feb04132482412051b7df24f06d4860234107ad.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
37.247.35.132:443
50.243.30.51:6601
162.241.204.234:6516
Targets
-
-
Target
c6784abd48dc7e4cbaf9387e2feb04132482412051b7df24f06d4860234107ad
-
Size
196KB
-
MD5
8440469645ebb3770dc1ccd744bb44c6
-
SHA1
5b1e7f3792c1b2214e317d2d060884b3c6d6194e
-
SHA256
c6784abd48dc7e4cbaf9387e2feb04132482412051b7df24f06d4860234107ad
-
SHA512
115bd9b2c695b579fea66eb3f133b3a98e5c2e49ad0a356216cc464f27f56572daec6505b38d465cb98f3c8f41272585f49b921f8a1905cda59140435ed89fb0
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-