Analysis
-
max time kernel
82s -
max time network
25s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-11-2020 11:13
Behavioral task
behavioral1
Sample
9cf0b0189fed5c6678b7082ac61f3f7ec9c4f4880ed32675eb3bf9d688672bab.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
9cf0b0189fed5c6678b7082ac61f3f7ec9c4f4880ed32675eb3bf9d688672bab.exe
-
Size
392KB
-
MD5
872170525ea189b963304abd9e3db83b
-
SHA1
5afb84f3d3e1b6d1ece2e533951b0837fa5b1758
-
SHA256
9cf0b0189fed5c6678b7082ac61f3f7ec9c4f4880ed32675eb3bf9d688672bab
-
SHA512
7062fe341d50de8f1b7dcf70870d94d757f201239ea7d4a7490d2a52837853d1ad1ce7e4cfd19b29e947cc5dc031389f17262663907e7f2d2d496908d4d26a90
Malware Config
Extracted
Family
dridex
Botnet
10121
C2
87.98.218.33:443
54.38.143.246:691
92.38.128.47:3389
159.65.79.173:3886
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1128-0-0x0000000000400000-0x000000000042D000-memory.dmp dridex_ldr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1128-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB