General
-
Target
0ae09aa6c01a64e121af0d0c1a91c32d9e232e3d1334a83b90e5b36702426a4e
-
Size
168KB
-
Sample
210304-dtv4cmd7b6
-
MD5
7b5079631af6063161abebaab19517b6
-
SHA1
f385dc8db60e53e960010d19d66432f1a6222702
-
SHA256
0ae09aa6c01a64e121af0d0c1a91c32d9e232e3d1334a83b90e5b36702426a4e
-
SHA512
19db6575231927d1ff4b02943a5d14f311093bd864521b840bb3122dfc61eb3b2017c07f5dc88db3631537854bb6d0010c37074983f77c80e575656aa0383868
Static task
static1
Behavioral task
behavioral1
Sample
0ae09aa6c01a64e121af0d0c1a91c32d9e232e3d1334a83b90e5b36702426a4e.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
173.203.78.138:443
217.160.107.189:6601
77.220.64.150:5037
Targets
-
-
Target
0ae09aa6c01a64e121af0d0c1a91c32d9e232e3d1334a83b90e5b36702426a4e
-
Size
168KB
-
MD5
7b5079631af6063161abebaab19517b6
-
SHA1
f385dc8db60e53e960010d19d66432f1a6222702
-
SHA256
0ae09aa6c01a64e121af0d0c1a91c32d9e232e3d1334a83b90e5b36702426a4e
-
SHA512
19db6575231927d1ff4b02943a5d14f311093bd864521b840bb3122dfc61eb3b2017c07f5dc88db3631537854bb6d0010c37074983f77c80e575656aa0383868
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-