Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-01-2022 22:50
Static task
static1
Behavioral task
behavioral1
Sample
fa61c3c9e2089deb3f2b40333f5ee0860177692c436c50b07eef85993a1dbfa9.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
fa61c3c9e2089deb3f2b40333f5ee0860177692c436c50b07eef85993a1dbfa9.exe
-
Size
212KB
-
MD5
02c1738fd59b0254264641b17e0d46d3
-
SHA1
5f598551a5ca46ebd0786bedcdd6cc82f0112442
-
SHA256
fa61c3c9e2089deb3f2b40333f5ee0860177692c436c50b07eef85993a1dbfa9
-
SHA512
c3de93d62b90c482ab11a01f1f3a3a0e97b1e902aaded10c404dcde8738ed159815a363e8755bf9a88df260ff4d88956f4c26852e87ab1c77d02eb228b29c30a
Malware Config
Extracted
Family
dridex
Botnet
40400
C2
213.136.94.177:443
217.20.166.178:4664
37.205.9.252:8443
70.39.251.94:3889
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3776-115-0x0000000010000000-0x0000000010035000-memory.dmp dridex_ldr_dmod