General
-
Target
c4voo0gc.rar
-
Size
576KB
-
Sample
220626-f3hd9aaed3
-
MD5
84b7173353617c4c216397c3e68cb948
-
SHA1
ec64476b9242df713471a933849ac75593edd2a9
-
SHA256
4bbcbe529479c0526f33fa0e878b58abeb727debee1c924616a6e1f9a95980b9
-
SHA512
c69886872913e0ef7121ea0105362cf44352a3619d1aa55b0ef6225b3ba177ef09f3235bdca5e19072c040029bf276493b304a12acfadfd586a78d6231497eb0
Static task
static1
Behavioral task
behavioral1
Sample
c4voo0gc.dll
Resource
win7-20220414-en
Malware Config
Extracted
dridex
10444
77.220.64.131:443
5.196.204.251:5037
192.99.41.136:981
24.229.3.146:4664
Targets
-
-
Target
c4voo0gc.rar
-
Size
576KB
-
MD5
84b7173353617c4c216397c3e68cb948
-
SHA1
ec64476b9242df713471a933849ac75593edd2a9
-
SHA256
4bbcbe529479c0526f33fa0e878b58abeb727debee1c924616a6e1f9a95980b9
-
SHA512
c69886872913e0ef7121ea0105362cf44352a3619d1aa55b0ef6225b3ba177ef09f3235bdca5e19072c040029bf276493b304a12acfadfd586a78d6231497eb0
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-