Analysis
-
max time kernel
32s -
max time network
113s -
platform
windows10_x64 -
resource
win10 -
submitted
24-09-2020 07:38
Static task
static1
Behavioral task
behavioral1
Sample
DRIDEX (3).dll
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
General
-
Target
DRIDEX (3).dll
-
Size
320KB
-
MD5
eafb12224f9a1b16fff806e40b252c5d
-
SHA1
4485cea69f77e0054d3bc75b7fa74ba4110f4333
-
SHA256
b6061934972e541bf1f421f92c7342892661ebb98f75bd833b4c14ddbdd9291f
-
SHA512
5d3b37bafcc69434fb9378ca42bd8cd7ecf1e7e3a41367d783fa42c816ecae1042db5be53d81cda4c12c23779010e5d989261ee9caf52898fa8476c6d8361ee9
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
151.236.219.181:443
142.4.6.57:14043
162.144.127.197:3786
103.40.116.68:5443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3188-1-0x0000000073EC0000-0x0000000073EFD000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3100 wrote to memory of 3188 3100 rundll32.exe rundll32.exe PID 3100 wrote to memory of 3188 3100 rundll32.exe rundll32.exe PID 3100 wrote to memory of 3188 3100 rundll32.exe rundll32.exe