General
-
Target
d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f
-
Size
616KB
-
Sample
250113-hze6tsvjbk
-
MD5
77fb4fb4f00a4351f4d192f08df9b35d
-
SHA1
143899c9230c071cca561036168d317eac8d5eb5
-
SHA256
d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f
-
SHA512
db45c5023c5f742e8f695e59c9d69c5c5457dda1d43d6f4147e749d94d4dcfbd80269e256d35fea3fe46e4ab51430f176eaf92fc51a1664e21325339b00d3338
-
SSDEEP
6144:Yg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAS:Y82AK5HOEksJ1YW7DwzqyQ
Static task
static1
Behavioral task
behavioral1
Sample
d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f
-
Size
616KB
-
MD5
77fb4fb4f00a4351f4d192f08df9b35d
-
SHA1
143899c9230c071cca561036168d317eac8d5eb5
-
SHA256
d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f
-
SHA512
db45c5023c5f742e8f695e59c9d69c5c5457dda1d43d6f4147e749d94d4dcfbd80269e256d35fea3fe46e4ab51430f176eaf92fc51a1664e21325339b00d3338
-
SSDEEP
6144:Yg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAS:Y82AK5HOEksJ1YW7DwzqyQ
-
Dridex family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-