Analysis
-
max time kernel
144s -
max time network
175s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
08-08-2021 19:03
Static task
static1
Behavioral task
behavioral1
Sample
a9061ada7e7f9927090e10b5dbf31c38.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
a9061ada7e7f9927090e10b5dbf31c38.exe
-
Size
1.1MB
-
MD5
a9061ada7e7f9927090e10b5dbf31c38
-
SHA1
9a1bf454713bff1a4a950d496f7a562d99a66c30
-
SHA256
c99b4a39f1f0eed0b89576edc9d847c300ab9377ccb1891f8634f9a195222821
-
SHA512
7592651bfa304ce92b8adcc01ce2e4ad6d84bf53879d58457288c60d035f2f7cd89e40fdad471c3066b3f963724fe3c648075c4eb10b5e468a37f03a7668ad11
Malware Config
Extracted
Family
dridex
Botnet
10111
C2
158.106.98.110:6225
149.210.181.82:10172
178.33.13.40:7443
rc4.plain
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
a9061ada7e7f9927090e10b5dbf31c38.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a9061ada7e7f9927090e10b5dbf31c38.exe