Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
28-06-2022 14:54
Behavioral task
behavioral1
Sample
Dridex_e9a50d650923e482ddc8bf38b029a2355d8dc804b6c19df8d41efa061df7ed99.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
Dridex_e9a50d650923e482ddc8bf38b029a2355d8dc804b6c19df8d41efa061df7ed99.exe
-
Size
512KB
-
MD5
d04c17a701bacaae197fd51c95acf1b3
-
SHA1
2062257212e5db564c3f7e37dc676b5dc3f230a6
-
SHA256
e9a50d650923e482ddc8bf38b029a2355d8dc804b6c19df8d41efa061df7ed99
-
SHA512
0f2bcaad3efd53a7cda5ca627dac08e343a30a82811879804626cfa929b730eb160c13dcf1b69c323114df17a907558d263dc5d9995054219fc58b0eee7ca387
Malware Config
Extracted
Family
dridex
Botnet
10111
C2
217.20.166.177:443
54.38.143.246:691
92.38.128.47:3389
rc4.plain
rc4.plain
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4532-131-0x0000000000400000-0x0000000000484000-memory.dmp dridex_ldr_dmod