General
-
Target
b1cc2f74ae19469f2aaf23ad7183164a22c465282ab0c385e44e3d0cc9ef8c27
-
Size
196KB
-
Sample
210403-yrz988dngx
-
MD5
ae2c44e15d163b6742ece9697d6001bb
-
SHA1
f4e23e2a58ccbaa475f1decea04397a5af249f91
-
SHA256
b1cc2f74ae19469f2aaf23ad7183164a22c465282ab0c385e44e3d0cc9ef8c27
-
SHA512
cabd462fa8679328ed3359d9947a61a5623336f831abe979e09828dae6a9fd9cde83ced405f7ef6746cf94866819637a97c38d90deb85a0f57cc0c647674f68c
Static task
static1
Behavioral task
behavioral1
Sample
b1cc2f74ae19469f2aaf23ad7183164a22c465282ab0c385e44e3d0cc9ef8c27.dll
Resource
win7v20201028
Malware Config
Extracted
dridex
111
37.247.35.132:443
50.243.30.51:6601
162.241.204.234:6516
Targets
-
-
Target
b1cc2f74ae19469f2aaf23ad7183164a22c465282ab0c385e44e3d0cc9ef8c27
-
Size
196KB
-
MD5
ae2c44e15d163b6742ece9697d6001bb
-
SHA1
f4e23e2a58ccbaa475f1decea04397a5af249f91
-
SHA256
b1cc2f74ae19469f2aaf23ad7183164a22c465282ab0c385e44e3d0cc9ef8c27
-
SHA512
cabd462fa8679328ed3359d9947a61a5623336f831abe979e09828dae6a9fd9cde83ced405f7ef6746cf94866819637a97c38d90deb85a0f57cc0c647674f68c
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-