Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-11-2020 12:01
Behavioral task
behavioral1
Sample
5af5c1d64c510a6a2b4bfc0dde6b6f0e.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
5af5c1d64c510a6a2b4bfc0dde6b6f0e.exe
-
Size
327KB
-
MD5
f7892d6773d53427728df0a5212d006a
-
SHA1
4e51d25540884eaf9766180035df006826e542bf
-
SHA256
bcd77546fbcce0d670f77ff60edd21412fafec1b86665ae427ffcc16d836dde3
-
SHA512
e8b9e50effed334f6074f4460c2e7f100662dfa9d19ea95c410da42c28043877672036572e72ecb585f66ea9ffb9dbc25ed3967978e54c104894137c0eafddb3
Malware Config
Extracted
Family
dridex
Botnet
10121
C2
87.98.218.33:443
54.38.143.246:691
92.38.128.47:3389
159.65.79.173:3886
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/532-0-0x0000000000400000-0x000000000042B000-memory.dmp dridex_ldr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/532-0-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB