MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50ce64c36ae7338663d3adbfe1d28679513dcf1ff4ff0355d867c1ff4ea7ead3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 50ce64c36ae7338663d3adbfe1d28679513dcf1ff4ff0355d867c1ff4ea7ead3
SHA3-384 hash: 3064b73f483f07f3a34135233e97e1bb731abb36261001c151d29cd15ebf7107919291dbfd7aaedb401bc563f68e4689
SHA1 hash: 60f75ac91464218758194f01732601076133d1e8
MD5 hash: 46852d53b7c4fad18feb5b45d43c0a96
humanhash: alabama-jupiter-triple-fruit
File name:2020-06-22-initial-Dridex-DLL-retrieved-by-spreadsheet-macro.bin
Download: download sample
Signature Dridex
File size:380'928 bytes
First seen:2020-06-26 08:45:01 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 0eaa5595d00b47de011282d15edb531f (3 x Dridex)
ssdeep 6144:jLSSU2zp6nAB6E0Xq3hbjV1Jj6vMRU/YbAk5bFL8c5HQ70GZqGIOkqcjxNxb19:XSwzpP26PmjQbptUbgqS7xJ9
Threatray 29 similar samples on MalwareBazaar
TLSH 2D84D001BE91C07AE666623B8D61CA74637DFDC41B3418E736C40F8BF62A2D14B31766
Reporter JAMESWT_WT
Tags:dll Dridex

Intelligence


File Origin
# of uploads :
1
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2020-06-26 08:10:37 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
22 of 31 (70.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion trojan discovery
Behaviour
Suspicious use of WriteProcessMemory
Checks whether UAC is enabled
Checks for installed software on the system
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments