General
-
Target
b1554blb.pdf
-
Size
539KB
-
Sample
220611-tvsrxaffhl
-
MD5
1ba0b20a2d03d8af03a7faa42b06417f
-
SHA1
4c528bb2afd93d8cb1199d05dc33d77e08f0ee88
-
SHA256
f5951b345050e10fa0d3b70b42e6b56d5a720a7a67c381345e33c145e2ba2452
-
SHA512
5447e2424e0beeace8c1d3de285fcd841b184e9ed1b3035334fd3005399aa0947b5688a22754b9114ff3f9444906481a519477fbd9cfdb17f23136ad14f6eef3
Static task
static1
Behavioral task
behavioral1
Sample
b1554blb.dll
Resource
win7-20220414-en
Malware Config
Extracted
dridex
10444
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
Targets
-
-
Target
b1554blb.pdf
-
Size
539KB
-
MD5
1ba0b20a2d03d8af03a7faa42b06417f
-
SHA1
4c528bb2afd93d8cb1199d05dc33d77e08f0ee88
-
SHA256
f5951b345050e10fa0d3b70b42e6b56d5a720a7a67c381345e33c145e2ba2452
-
SHA512
5447e2424e0beeace8c1d3de285fcd841b184e9ed1b3035334fd3005399aa0947b5688a22754b9114ff3f9444906481a519477fbd9cfdb17f23136ad14f6eef3
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-