Analysis
-
max time kernel
12s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 11:32
Behavioral task
behavioral1
Sample
944a1d31774ee3886918826ce1487a89.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
944a1d31774ee3886918826ce1487a89.exe
-
Size
327KB
-
MD5
5fdbca2752868186e21d1e723a58db4c
-
SHA1
c8124dcbb2f3b902d929829758fcbcf36d9f2dbf
-
SHA256
43202759cfe6ebf40d59ff45d2b0f9042e06b5d0a3f36b0c58d931d7ffff2105
-
SHA512
d4e52b162a7aed4136afb9e1c50baeb92ec55656293bbd740d7a1d60980ae34889fe28fd7629eee3e6b585cff599088a80bfb0349b367eb0fbade6da82b5d668
Malware Config
Extracted
Family
dridex
Botnet
10121
C2
87.98.218.33:443
54.38.143.246:691
92.38.128.47:3389
159.65.79.173:3886
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4632-0-0x0000000000400000-0x000000000042B000-memory.dmp dridex_ldr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4632-0-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB