General
-
Target
ef74ea831d788c055bf7b124d77f5070da4e950cb86a922e3ac4008cfaa8e707
-
Size
196KB
-
Sample
210403-2z78amyh5e
-
MD5
130565d23dd71ba89e697c7ecc6725a4
-
SHA1
44a5b9bd927e8d6640b940dbeedc39dd0661147a
-
SHA256
ef74ea831d788c055bf7b124d77f5070da4e950cb86a922e3ac4008cfaa8e707
-
SHA512
88b603ce938c39516c8d3299173e3c78160aa17e3e4c3c330e08bc3392509078d7e049860885300134b0866a07d52020be3768cc711eab36e3f15d6dae4cba79
Static task
static1
Behavioral task
behavioral1
Sample
ef74ea831d788c055bf7b124d77f5070da4e950cb86a922e3ac4008cfaa8e707.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
37.247.35.132:443
50.243.30.51:6601
162.241.204.234:6516
Targets
-
-
Target
ef74ea831d788c055bf7b124d77f5070da4e950cb86a922e3ac4008cfaa8e707
-
Size
196KB
-
MD5
130565d23dd71ba89e697c7ecc6725a4
-
SHA1
44a5b9bd927e8d6640b940dbeedc39dd0661147a
-
SHA256
ef74ea831d788c055bf7b124d77f5070da4e950cb86a922e3ac4008cfaa8e707
-
SHA512
88b603ce938c39516c8d3299173e3c78160aa17e3e4c3c330e08bc3392509078d7e049860885300134b0866a07d52020be3768cc711eab36e3f15d6dae4cba79
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-