General
-
Target
b007b17a8d94a43d03af6b5b6635f4b7
-
Size
750KB
-
Sample
211027-v84l1ahcfp
-
MD5
b007b17a8d94a43d03af6b5b6635f4b7
-
SHA1
995cfbbcfa1f50da1c3293c6370c385e51221b92
-
SHA256
c33275c9f08346b52bcb68850302237c849f210547e0affa4fc8e7b38e0cd233
-
SHA512
0a1b0c3c107b435f8b12efb2aa815ee66cb64a5ca6a2988d568c0c5dfab3d44294597c08125c2226863b1ddd03b1864c2bb971a2cb3b5d930ed3fa7768eda4e8
Static task
static1
Behavioral task
behavioral1
Sample
b007b17a8d94a43d03af6b5b6635f4b7.dll
Resource
win7-en-20211014
Malware Config
Extracted
dridex
10555
192.46.210.220:443
143.244.140.214:808
45.77.0.96:6891
185.56.219.47:8116
Targets
-
-
Target
b007b17a8d94a43d03af6b5b6635f4b7
-
Size
750KB
-
MD5
b007b17a8d94a43d03af6b5b6635f4b7
-
SHA1
995cfbbcfa1f50da1c3293c6370c385e51221b92
-
SHA256
c33275c9f08346b52bcb68850302237c849f210547e0affa4fc8e7b38e0cd233
-
SHA512
0a1b0c3c107b435f8b12efb2aa815ee66cb64a5ca6a2988d568c0c5dfab3d44294597c08125c2226863b1ddd03b1864c2bb971a2cb3b5d930ed3fa7768eda4e8
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-