Analysis
-
max time kernel
49s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-11-2020 13:44
Static task
static1
Behavioral task
behavioral1
Sample
57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8.exe
-
Size
276KB
-
MD5
95cc84b83fe02e3b970397634b300816
-
SHA1
a5b419e570136866d793d51bc498731aa51edbe6
-
SHA256
57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8
-
SHA512
7df460dc6d9cc38e9e088dd6a772ebc69150d5ce158c48b20a58b88839f1fbda4f7b97afa2d1cbf9954d0efeb73cf3105d0653882ebd6a5527a3e14293479111
Malware Config
Extracted
Family
dridex
Botnet
12333
C2
178.62.189.250:443
217.79.184.243:33443
195.159.28.230:4443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3084-2-0x0000000000070000-0x00000000000A9000-memory.dmp dridex_ldr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3084-2-0x0000000000070000-0x00000000000A9000-memory.dmpFilesize
228KB