General
-
Target
572a3b5b02a5a88450ff127e658ae51585bc8a98209c35cdc79a3322bed48f88
-
Size
639KB
-
Sample
210419-tyvwtqfz1e
-
MD5
49ecd2b80810c47ca0f06a5225e85c54
-
SHA1
bdf93eed33c9927d6ed0bcdc3f44294d93b88648
-
SHA256
572a3b5b02a5a88450ff127e658ae51585bc8a98209c35cdc79a3322bed48f88
-
SHA512
0fa1da489ad13fdce1e6e6688ea2f245f466df79f94604faf43ea80d45710df578f700706dc28e5b9e2464013a1c0673a38e6af1b3ea7e7425d8e6f8307488d0
Static task
static1
Behavioral task
behavioral1
Sample
572a3b5b02a5a88450ff127e658ae51585bc8a98209c35cdc79a3322bed48f88.dll
Resource
win7v20210410
Malware Config
Extracted
dridex
10444
146.185.170.249:443
62.75.251.60:6601
185.148.168.25:2303
Targets
-
-
Target
572a3b5b02a5a88450ff127e658ae51585bc8a98209c35cdc79a3322bed48f88
-
Size
639KB
-
MD5
49ecd2b80810c47ca0f06a5225e85c54
-
SHA1
bdf93eed33c9927d6ed0bcdc3f44294d93b88648
-
SHA256
572a3b5b02a5a88450ff127e658ae51585bc8a98209c35cdc79a3322bed48f88
-
SHA512
0fa1da489ad13fdce1e6e6688ea2f245f466df79f94604faf43ea80d45710df578f700706dc28e5b9e2464013a1c0673a38e6af1b3ea7e7425d8e6f8307488d0
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-