Analysis
-
max time kernel
28s -
max time network
122s -
platform
windows10_x64 -
resource
win10 -
submitted
24-09-2020 07:38
Static task
static1
Behavioral task
behavioral1
Sample
DRIDEX (2).dll
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
DRIDEX (2).dll
-
Size
320KB
-
MD5
26a799534430589b72111ccb335c2400
-
SHA1
7c6692e00af5e345c70d98862d6dacccc283e05e
-
SHA256
3ab48ca45cd8a40aa0100279752afd3e89003bb85bf420c8b1be62e019f4c9eb
-
SHA512
558f81bc111e3330c74762ae07af4737e719de6b486a48f89b72ceb111e0940c5317c9f71be4d0186c8178becdc346cec94ae33fb880a4b561cb891dd9058181
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
151.236.219.181:443
142.4.6.57:14043
162.144.127.197:3786
103.40.116.68:5443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3224-1-0x0000000073F30000-0x0000000073F6D000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3012 wrote to memory of 3224 3012 rundll32.exe rundll32.exe PID 3012 wrote to memory of 3224 3012 rundll32.exe rundll32.exe PID 3012 wrote to memory of 3224 3012 rundll32.exe rundll32.exe