MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2e53039cd08d3426760fc1c463026df6aaf8fe8fc9f753983bee946b9ebc619d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: 2e53039cd08d3426760fc1c463026df6aaf8fe8fc9f753983bee946b9ebc619d
SHA3-384 hash: cf13af127d4d278dad9e3e0160cd61a82c4cd1b3f3017c85a1573466852bad9ed49c3214145b39a0df0ce77f9421810b
SHA1 hash: 1796d2e422c8d6e528f50cd3d5ce740c7919806d
MD5 hash: 13f0a44dfcb273629de90e264ffc10db
humanhash: pasta-massachusetts-summer-white
File name:2e53039cd08d3426760fc1c463026df6aaf8fe8fc9f753983bee946b9ebc619d
Download: download sample
Signature Dridex
File size:827'392 bytes
First seen:2020-11-07 17:10:37 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 96927a99699f680c7045d444b5e2e2ca (13 x Dridex)
ssdeep 24576:XCUxGSHd8cik3CJr0zuISZVKnigKdNCXl:XCCdYE4wunuh4
TLSH 9C05D07482FDC315E1AB95F5F9E10CA00525F4268E369ACF2229812A147A6F53CF4B3F
Reporter seifreed
Tags:Dridex

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Searching for the window
Creating a window
Changing a file
Forced system process termination
DNS request
Sending a custom TCP request
Forced shutdown of a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.Drixed
Status:
Malicious
First seen:
2020-11-07 17:15:22 UTC
AV detection:
32 of 48 (66.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dridex botnet loader persistence
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies Control Panel
Suspicious use of SetWindowsHookEx
Enumerates connected drives
Modifies Installed Components in the registry
Dridex Loader
Dridex
Unpacked files
SH256 hash:
2e53039cd08d3426760fc1c463026df6aaf8fe8fc9f753983bee946b9ebc619d
MD5 hash:
13f0a44dfcb273629de90e264ffc10db
SHA1 hash:
1796d2e422c8d6e528f50cd3d5ce740c7919806d
SH256 hash:
b5d5c5c0d89f045aff2e648d88ec67488efa300197c86b92c7008ba5b1eaf031
MD5 hash:
d64d2b0b1d293a642c8834b420e2a829
SHA1 hash:
7cb962e443c8598ee1f135f0c4b6d3986f99d50a
Detections:
win_dridex_auto
SH256 hash:
d49ff8f8e4621ce411ca0022f22bc3856d9194b883d60f11d1f7b29fe57aef15
MD5 hash:
29e007da5649ad6772152569a3216387
SHA1 hash:
b7c82fef40e749062d2fb32603a4169e2dec185a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DridexV4
Author:kevoreilly
Description:Dridex v4 Payload
Rule name:Embedded_PE
Rule name:win_dridex_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_dridex_loader_v2
Author:Johannes Bader @viql
Description:detects some Dridex loaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments