Analysis
-
max time kernel
128s -
max time network
176s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
01-08-2021 06:45
Static task
static1
Behavioral task
behavioral1
Sample
a66dbdea71c220e57325e20d01516820.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
a66dbdea71c220e57325e20d01516820.exe
-
Size
1.1MB
-
MD5
a66dbdea71c220e57325e20d01516820
-
SHA1
c72bfbfb631123ff26c4278ca4f059b8185d46d8
-
SHA256
851c23c1e7511cae9134da4086116a84a8c28405a0ba05f1a9654a518e2cd64d
-
SHA512
d9d46a0c0b089c8f221cd103dff598b7c5056559e987ca69de17e63a6da34e514ba5f93d514b7205b698d8988068f69e63aa91dad4f5e1e270289b8f80cd5124
Malware Config
Extracted
Family
dridex
Botnet
10111
C2
103.109.247.13:10443
116.203.25.236:8443
103.253.107.156:7443
rc4.plain
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
a66dbdea71c220e57325e20d01516820.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a66dbdea71c220e57325e20d01516820.exe