Analysis
-
max time kernel
143s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30-01-2021 21:53
Behavioral task
behavioral1
Sample
47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exe
-
Size
164KB
-
MD5
97b55759dbaa8cff7dd388b1df7501bb
-
SHA1
41992692046db2ce41707421f34ce7f2e8a42bec
-
SHA256
47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96
-
SHA512
fd92d49cc53fd17af1ccb98a7938421fdfafb71823da195d2a21371b6fbaaf4878dec63f21e164c27fc0b4df64595778d23336e0cd0069d2eab3a1783ad20ece
Malware Config
Extracted
Family
dridex
Botnet
10121
C2
87.98.218.33:443
54.38.143.246:691
159.65.79.173:3886
153.122.13.133:1443
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1740-2-0x00000000011E0000-0x000000000120B000-memory.dmp dridex_ldr -
Processes:
47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1740-2-0x00000000011E0000-0x000000000120B000-memory.dmpFilesize
172KB