Analysis

  • max time kernel
    100s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2022 15:03

General

  • Target

    c70a58085a150022414711abbb6d2481016165bb389db7cfffa32bf47844c405.exe

  • Size

    360KB

  • MD5

    4a1a3219af53921e6f1791566f40a91d

  • SHA1

    82523d7f3960d4816c09cbda9b7cd76694461197

  • SHA256

    c70a58085a150022414711abbb6d2481016165bb389db7cfffa32bf47844c405

  • SHA512

    a37b86fed099da96017eb24017c72106d219d0949c65cdf08ab168153f69d62d205bca38e656f012c02fd5cab6330f2aa628d19b882bd58f3856d91bf4f08853

Score
10/10

Malware Config

Extracted

Family

dridex

C2

139.59.246.59:443

159.69.89.90:3389

159.89.179.87:3389

62.210.26.206:3389

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c70a58085a150022414711abbb6d2481016165bb389db7cfffa32bf47844c405.exe
    "C:\Users\Admin\AppData\Local\Temp\c70a58085a150022414711abbb6d2481016165bb389db7cfffa32bf47844c405.exe"
    1⤵
      PID:4236

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4236-130-0x0000000000622000-0x000000000063A000-memory.dmp
      Filesize

      96KB

    • memory/4236-131-0x0000000000622000-0x000000000063A000-memory.dmp
      Filesize

      96KB

    • memory/4236-132-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB