Analysis
-
max time kernel
25s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-11-2020 06:21
Static task
static1
Behavioral task
behavioral1
Sample
yqsc2kqmgif.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
yqsc2kqmgif.dll
-
Size
176KB
-
MD5
f0a0d2f0d368a07171e5a3b74cb365c5
-
SHA1
27e722207cdd804675b9555d9fa1767733f4fa61
-
SHA256
7a91d43923b23b640842519263ff8dc2eb0f411f2f1688727db5c7dfacbab7be
-
SHA512
abe42dc28a6a0c112cfdab36bb51da9215abab6ec4df54a4b31da3ce84eff90f70d9e618a787bead65038eb394ba762207d2ddc1b28e6f2d48428f0c289e8b62
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
77.220.64.39:443
69.164.207.140:3388
78.47.139.43:4443
103.244.206.74:33443
rc4.plain
rc4.plain
Signatures
-
resource yara_rule behavioral2/memory/2292-1-0x0000000073DB0000-0x0000000073DCD000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 508 wrote to memory of 2292 508 rundll32.exe 70 PID 508 wrote to memory of 2292 508 rundll32.exe 70 PID 508 wrote to memory of 2292 508 rundll32.exe 70