Analysis
-
max time kernel
150s -
max time network
109s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-06-2021 08:45
Static task
static1
Behavioral task
behavioral1
Sample
a9cec405267f2d20857975c662091f10.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
a9cec405267f2d20857975c662091f10.exe
-
Size
1.4MB
-
MD5
a9cec405267f2d20857975c662091f10
-
SHA1
eb5c2850276a10ae20713af3cbbe6d1b37790c96
-
SHA256
bc85d3179f469f47031153a274666c3306bbfdbb71bd74eda15073899e16b4b6
-
SHA512
d6ef0a3e2c756930ea965967f49dcd967683d58d21d84c23e4257b92b1d5244c3a0549e71498e134d563aa6a9c64ee49fa3824d91c677ef716c6c0bd0b8ea7af
Malware Config
Extracted
Family
dridex
Botnet
10111
C2
139.59.59.242:443
91.207.28.33:13786
178.128.197.110:4664
rc4.plain
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
a9cec405267f2d20857975c662091f10.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a9cec405267f2d20857975c662091f10.exe