Analysis
-
max time kernel
77s -
max time network
23s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-11-2020 18:24
Static task
static1
Behavioral task
behavioral1
Sample
3795a2228558a1b136746ea70125bc53cf05e2a6ce078d39667af4e3adee3a02.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
3795a2228558a1b136746ea70125bc53cf05e2a6ce078d39667af4e3adee3a02.exe
-
Size
615KB
-
MD5
0aaeecf18177e9beb320bcccd5e1da13
-
SHA1
84ec66cb76d491070039a584de658506e10b9934
-
SHA256
3795a2228558a1b136746ea70125bc53cf05e2a6ce078d39667af4e3adee3a02
-
SHA512
675d3cd66aed97ceb68b19fa5b28c7f943669a11f6154eb3d5e52d879179c161c07b9e8487eb5e298c5fee9b7806e50ba3133b7459d88fc419268ec0a4bd1b6f
Malware Config
Extracted
Family
dridex
Botnet
10121
C2
87.98.218.33:443
54.38.143.246:691
92.38.128.47:3389
159.65.79.173:3886
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/300-0-0x0000000000400000-0x000000000042D000-memory.dmp dridex_ldr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/300-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB