General
-
Target
c48adf18af5bc8374dfd2cde4ea4b67f6cb4d14298c0ecdf5290e88843b5f792
-
Size
196KB
-
Sample
210304-pzt4aafpj6
-
MD5
dfe16d23d7a5195cacfb5c837dc2cc81
-
SHA1
9e74d9dcc3f68e2c13cd7f308d0dab09ffd0ac76
-
SHA256
c48adf18af5bc8374dfd2cde4ea4b67f6cb4d14298c0ecdf5290e88843b5f792
-
SHA512
68afe83b91d12d846f9dc4964725f6e65bf64049e95900457875c3921d9919fab219be361f2b66f810ebd4994e66550f8afd1be19f53b0dfe86cca3e277509f5
Static task
static1
Behavioral task
behavioral1
Sample
c48adf18af5bc8374dfd2cde4ea4b67f6cb4d14298c0ecdf5290e88843b5f792.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
37.247.35.132:443
50.243.30.51:6601
162.241.204.234:6516
Targets
-
-
Target
c48adf18af5bc8374dfd2cde4ea4b67f6cb4d14298c0ecdf5290e88843b5f792
-
Size
196KB
-
MD5
dfe16d23d7a5195cacfb5c837dc2cc81
-
SHA1
9e74d9dcc3f68e2c13cd7f308d0dab09ffd0ac76
-
SHA256
c48adf18af5bc8374dfd2cde4ea4b67f6cb4d14298c0ecdf5290e88843b5f792
-
SHA512
68afe83b91d12d846f9dc4964725f6e65bf64049e95900457875c3921d9919fab219be361f2b66f810ebd4994e66550f8afd1be19f53b0dfe86cca3e277509f5
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-