Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
04-07-2021 07:09
Behavioral task
behavioral1
Sample
959cc09f5692173e1cf2284c780ad904.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
959cc09f5692173e1cf2284c780ad904.exe
-
Size
1.0MB
-
MD5
959cc09f5692173e1cf2284c780ad904
-
SHA1
a1078b2f0708557a54a83a46718093dd0e134d7d
-
SHA256
141629b0a182cef15e54176caa05d9dab26fa0eaebae92eb5b87eee30e94159b
-
SHA512
c9272e4808cc024f0825752a8561604195f14bf3e8b7124ab63ff20622397555163eec9d302b59065b910507c865f8798a817e7b0420de4b8bbbb9c721617c31
Malware Config
Extracted
Family
dridex
Botnet
10111
C2
104.168.155.129:443
142.4.219.173:4664
176.31.117.84:9443
rc4.plain
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
959cc09f5692173e1cf2284c780ad904.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 959cc09f5692173e1cf2284c780ad904.exe