Analysis
-
max time kernel
13s -
max time network
102s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 12:32
Behavioral task
behavioral1
Sample
8b61ff68b15b5cfcc5efa673d8c9587e.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
8b61ff68b15b5cfcc5efa673d8c9587e.exe
-
Size
327KB
-
MD5
a7727e4637c58baa9e9a742f8da51b4d
-
SHA1
98a7a8a9386b8a732b2c9c5ef6234ceaeca05914
-
SHA256
2587028ac10ac763931538a434d27ca231a00fcfde0abe8b23db0957816c942a
-
SHA512
f59cb55ef50c9965ea5040378c37ba98622cdad780c7004124203f452fbd36a373f562a72da3d2bd7f1618c47ca0b9d62f4ed29d4c2b8031b5d409f249eae860
Malware Config
Extracted
Family
dridex
Botnet
10121
C2
87.98.218.33:443
54.38.143.246:691
92.38.128.47:3389
159.65.79.173:3886
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4800-0-0x0000000000400000-0x000000000042B000-memory.dmp dridex_ldr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4800-0-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB