General
-
Target
jknhou4k.zip
-
Size
785KB
-
Sample
220611-t77ftsgccr
-
MD5
adae957f96ecb08a9271bcbe38da2cc5
-
SHA1
acfaf6b3f0f2c97446e14567ba3fb4d101464ff4
-
SHA256
6860b23431c03b24449bf266854150b9a1afe5978b84f53803d446696a0e3621
-
SHA512
9018c290c9bb7ccd576a7dac15ddc1cc4051a9e6026a7013328984f0874638814197ffbb0adda8ee6a43e7d77b6de279585459e0bf12d6eeb2676b99edc150b6
Static task
static1
Behavioral task
behavioral1
Sample
jknhou4k.dll
Resource
win7-20220414-en
Malware Config
Extracted
dridex
10444
209.20.87.138:443
198.1.115.153:8172
151.236.29.248:6516
Targets
-
-
Target
jknhou4k.zip
-
Size
785KB
-
MD5
adae957f96ecb08a9271bcbe38da2cc5
-
SHA1
acfaf6b3f0f2c97446e14567ba3fb4d101464ff4
-
SHA256
6860b23431c03b24449bf266854150b9a1afe5978b84f53803d446696a0e3621
-
SHA512
9018c290c9bb7ccd576a7dac15ddc1cc4051a9e6026a7013328984f0874638814197ffbb0adda8ee6a43e7d77b6de279585459e0bf12d6eeb2676b99edc150b6
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-