Analysis
-
max time kernel
14s -
max time network
91s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 11:05
Static task
static1
Behavioral task
behavioral1
Sample
b6nlu684.rar.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
b6nlu684.rar.dll
-
Size
413KB
-
MD5
c4536bd01e8dbf70620596f4405cc009
-
SHA1
2abc224d7b6e9320ba6d00cc722120a95a5bf88a
-
SHA256
45d498fb79a063579d9d758e553a8c3f6792a1cc5a6979d6734d7afda6684359
-
SHA512
2eca1efda15314bbe7aaca902c3d8824116d193e7a0dac75bd0db14eb8c70bd16be8ee171e1b70b2f704fa77fbab67cd1ce6a2b6f33c81d345d6066647094308
Malware Config
Extracted
Family
dridex
Botnet
10444
C2
104.131.164.93:443
46.101.90.205:4643
27.254.174.84:4443
92.94.251.127:3786
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4784-3-0x00000000009A0000-0x00000000009DD000-memory.dmp dridex_ldr -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4688 wrote to memory of 4784 4688 rundll32.exe rundll32.exe PID 4688 wrote to memory of 4784 4688 rundll32.exe rundll32.exe PID 4688 wrote to memory of 4784 4688 rundll32.exe rundll32.exe