General
-
Target
a2c1142a25a5081b3ead3280a8f4405d5781032e556904a66196f2c7a3d27268
-
Size
604KB
-
Sample
211018-yfzdcsfear
-
MD5
04c6e562e2bbd3ccc221f6472f231b7f
-
SHA1
bdd6406d6dab7efab07907033ebd8e3df9af5dd8
-
SHA256
a2c1142a25a5081b3ead3280a8f4405d5781032e556904a66196f2c7a3d27268
-
SHA512
da0cf74900c63dac08ba9a211c880805a1384d34b2c24e4106c83d890878eacc6e4740b7af6781332c29bc9489273041e1eac6e9684bae984b20aa2ebb5911fc
Static task
static1
Behavioral task
behavioral1
Sample
a2c1142a25a5081b3ead3280a8f4405d5781032e556904a66196f2c7a3d27268.dll
Resource
win7-en-20210920
Malware Config
Extracted
dridex
10444
174.128.245.202:443
51.83.3.52:13786
69.64.50.41:6602
Targets
-
-
Target
a2c1142a25a5081b3ead3280a8f4405d5781032e556904a66196f2c7a3d27268
-
Size
604KB
-
MD5
04c6e562e2bbd3ccc221f6472f231b7f
-
SHA1
bdd6406d6dab7efab07907033ebd8e3df9af5dd8
-
SHA256
a2c1142a25a5081b3ead3280a8f4405d5781032e556904a66196f2c7a3d27268
-
SHA512
da0cf74900c63dac08ba9a211c880805a1384d34b2c24e4106c83d890878eacc6e4740b7af6781332c29bc9489273041e1eac6e9684bae984b20aa2ebb5911fc
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-