General
-
Target
c46eb850f9920336b99f11049f6c3c018a08ccdb75d3fb5ee7c1ecc08fc779b4
-
Size
196KB
-
Sample
210304-g544z9pqta
-
MD5
9757f74735004a2338226799a7fefe25
-
SHA1
57b95c655bd8a3cba07fc10dfeaded2f2456d9b5
-
SHA256
c46eb850f9920336b99f11049f6c3c018a08ccdb75d3fb5ee7c1ecc08fc779b4
-
SHA512
d4a2c0ae2abcd41dd56959a7ffd2f62eb45f4ef725ee37d1d1a9d351fcd67c9ec20e4b2976591d657afabe9000e16991b916ede2cf3965e3d6aa09569163b6f6
Static task
static1
Behavioral task
behavioral1
Sample
c46eb850f9920336b99f11049f6c3c018a08ccdb75d3fb5ee7c1ecc08fc779b4.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
37.247.35.132:443
50.243.30.51:6601
162.241.204.234:6516
Targets
-
-
Target
c46eb850f9920336b99f11049f6c3c018a08ccdb75d3fb5ee7c1ecc08fc779b4
-
Size
196KB
-
MD5
9757f74735004a2338226799a7fefe25
-
SHA1
57b95c655bd8a3cba07fc10dfeaded2f2456d9b5
-
SHA256
c46eb850f9920336b99f11049f6c3c018a08ccdb75d3fb5ee7c1ecc08fc779b4
-
SHA512
d4a2c0ae2abcd41dd56959a7ffd2f62eb45f4ef725ee37d1d1a9d351fcd67c9ec20e4b2976591d657afabe9000e16991b916ede2cf3965e3d6aa09569163b6f6
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-