General
-
Target
abc.txt
-
Size
26B
-
Sample
241230-r3cpjsxmhl
-
MD5
77ec9122c07d50702533f30c31bf1216
-
SHA1
865d4c2651033ae7dde69c77012a6e3875fe88fa
-
SHA256
d997a546378df1ac4b47a2836b5cb6dfcfbaf10c4298165928237112f2d6cb27
-
SHA512
8c434e5fb0b0427e50154804b01c6e53ebdad2a5fecd551c84bcecb8147c52cfa18bb9a6f2890ffa3df5a7f28d9a1273cd3c9662a6e8d6c7d42cde503c00a715
Static task
static1
Behavioral task
behavioral1
Sample
abc.txt
Resource
win10v2004-20241007-en
Malware Config
Extracted
dridex
40400
132.255.244.130:443
111.67.77.202:3389
198.50.236.57:443
45.122.223.13:8443
Targets
-
-
Target
abc.txt
-
Size
26B
-
MD5
77ec9122c07d50702533f30c31bf1216
-
SHA1
865d4c2651033ae7dde69c77012a6e3875fe88fa
-
SHA256
d997a546378df1ac4b47a2836b5cb6dfcfbaf10c4298165928237112f2d6cb27
-
SHA512
8c434e5fb0b0427e50154804b01c6e53ebdad2a5fecd551c84bcecb8147c52cfa18bb9a6f2890ffa3df5a7f28d9a1273cd3c9662a6e8d6c7d42cde503c00a715
-
Dridex family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Suspicious use of SetThreadContext
-