General

  • Target

    f36320aebc21821773fb775f7eb97fa80d3385748e07e24c790e63b759fded3c

  • Size

    223KB

  • MD5

    c39fbe80b2444f41dd51aa8ff154b9c0

  • SHA1

    06157eddf5293f5bd5fb4e065249da33fee321ed

  • SHA256

    f36320aebc21821773fb775f7eb97fa80d3385748e07e24c790e63b759fded3c

  • SHA512

    b08e2fcb74766046023c259e7e6b583f17ed73719d4fa237c7e68e167e6c35fbb2ba6fb282b038a41b22aa25262b92abf5c13c3dbcdfce2fefa7101d80ca92e8

  • SSDEEP

    3072:89dxYNdy+x8FKxPbc87lXliM3w7UfJs0RtXN+7yAn734d754mMygkP4m1EcW9V:EGeKrW7IN+7yGqy+rExf

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

5.9.178.143:443

185.230.161.62:3389

2.58.16.89:8443

rc4.plain
rc4.plain

Signatures

  • Dridex Loader 'dmod' strings 1 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Dridex family

Files

  • f36320aebc21821773fb775f7eb97fa80d3385748e07e24c790e63b759fded3c
    .exe windows x86

    98c2df7526b7475820db044d901fe31f


    Headers

    Imports

    Sections