MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1fb1e30d8d83d70029176587ca886c778f4c0e4619f3c7ff6bfa831a94fe8cbf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 1fb1e30d8d83d70029176587ca886c778f4c0e4619f3c7ff6bfa831a94fe8cbf
SHA3-384 hash: 2cfed409d8af76f46cd4c7fd8d6a5ac69420ea6afff6ed99a528780a5434b7c17e20fa08cf676e2a768f2e2982ff9734
SHA1 hash: a38c28c970b8d1b83c6b1b9682a81ae0b630464c
MD5 hash: ddbe5cda8f7681b78b7ebb729d18afc2
humanhash: network-maryland-happy-fruit
File name:1fb1e30d8d83d70029176587ca886c778f4c0e4619f3c7ff6bfa831a94fe8cbf
Download: download sample
Signature Dridex
File size:589'888 bytes
First seen:2020-11-09 21:09:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bd84ecc4debfafa111fc4123e13acb34 (33 x Dridex)
ssdeep 12288:gZ6xUH6xUFkyC/82TQh9mgdVHh1HxgS42uiTOuP:gZXHXFY9To9mgdT1HM2XTOs
Threatray 68 similar samples on MalwareBazaar
TLSH 22C4DF57F3298573D82E2274482F693B106FBCFCCD64394B73DA3A296A3A3C50427656
Reporter seifreed
Tags:Dridex

Intelligence


File Origin
# of uploads :
1
# of downloads :
68
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Drixed
Status:
Malicious
First seen:
2020-11-10 00:29:32 UTC
AV detection:
28 of 29 (96.55%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dridex botnet loader
Behaviour
Dridex Loader
Dridex
Malware Config
C2 Extraction:
5.9.178.143:443
2.58.16.89:8443
37.139.2.140:3889
217.160.78.166:4664
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DridexLoader
Author:kevoreilly
Description:Dridex v4 dropper C2 parsing function
Rule name:win_dridex_loader_v2
Author:Johannes Bader @viql
Description:detects some Dridex loaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments