Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
21-09-2021 15:09
Static task
static1
Behavioral task
behavioral1
Sample
a5a16095b9f28ade6a31a17f49ce00be.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
a5a16095b9f28ade6a31a17f49ce00be.exe
-
Size
875KB
-
MD5
a5a16095b9f28ade6a31a17f49ce00be
-
SHA1
ea6b79389659d69085b168e3105d7c8dcb6ab7bb
-
SHA256
b9f2d0a3ef79c8883be9adfa938d1dea808b46a2f71e56f7c0ca937922e0c971
-
SHA512
16e8aca29fa5c2c0dfa5199981b16db1cb3e0976f2658c650626758a174e3bbd84400cd1b51975ee56ee181a85ec6263c5f74a46bc1f1bfd780f6ead60466912
Malware Config
Extracted
Family
dridex
Botnet
10111
C2
212.39.115.102:9676
54.37.84.240:10172
156.67.220.186:6225
rc4.plain
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
a5a16095b9f28ade6a31a17f49ce00be.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a5a16095b9f28ade6a31a17f49ce00be.exe