MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51abbe06ac531f2abe91d1228f1812d95a8050798dec46d966527c252f5a3a65. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 51abbe06ac531f2abe91d1228f1812d95a8050798dec46d966527c252f5a3a65
SHA3-384 hash: 51a739b6abf017ab872d61605f84d9d9670d9760fcfdf0918b8e4d1f1a08b7ff780f51a57b322f88bf67d5228f720c6e
SHA1 hash: f92f7dd4928c73ccad799a98ef95b3d98e9096e8
MD5 hash: b963aff3ce651437da93419981190c38
humanhash: mexico-magnesium-august-five
File name:51abbe06ac531f2abe91d1228f1812d95a8050798dec46d966527c252f5a3a65
Download: download sample
Signature Dridex
File size:827'392 bytes
First seen:2020-11-10 11:09:48 UTC
Last seen:2024-07-24 14:15:03 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 5e92f32f651506f0575c80a2bef24448 (90 x Dridex)
ssdeep 12288:srcppXZ0b0exu8aDuoQ90sHd1ToS9YdfecpC/x5jMlJQbB9WMuuLqa8EmyCg:ywE0cu8aiT9hd1T34WckJuzOf8Emy7
Threatray 63 similar samples on MalwareBazaar
TLSH 7105E02372FFCB39D2BAE6B0EAFBB525281CBD01C82AC5856026D107965067453B573F
Reporter seifreed
Tags:Dridex

Intelligence


File Origin
# of uploads :
2
# of downloads :
60
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for the window
Creating a window
Changing a file
DNS request
Forced system process termination
Sending a custom TCP request
Forced shutdown of a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2020-11-10 11:12:40 UTC
AV detection:
33 of 48 (68.75%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dridex botnet evasion loader persistence trojan
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies Control Panel
Suspicious use of SetWindowsHookEx
Checks whether UAC is enabled
Enumerates connected drives
Modifies Installed Components in the registry
Dridex Loader
Dridex
Unpacked files
SH256 hash:
51abbe06ac531f2abe91d1228f1812d95a8050798dec46d966527c252f5a3a65
MD5 hash:
b963aff3ce651437da93419981190c38
SHA1 hash:
f92f7dd4928c73ccad799a98ef95b3d98e9096e8
SH256 hash:
0bd12042d7ba6b43dcc353cdf64a81c409c1a0315cf89ff7c08055a3a2bdc1e6
MD5 hash:
c1c3a6c6bb35b56f432bc5719af95651
SHA1 hash:
c497b146f5ca4175220ae56e2c10e401e69c792c
Detections:
win_dridex_auto
SH256 hash:
41132014d130630d54d6ae18e65a5cbedba89a7dc2a043148f3a640cd7421903
MD5 hash:
ca6c7750e8691832673750e5aa3ac013
SHA1 hash:
86ae269cf466261aa641b3bff73b86132892020e
Detections:
win_dridex_auto
Parent samples :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 note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DridexV4
Author:kevoreilly
Description:Dridex v4 Payload
Rule name:win_dridex_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_dridex_loader_v2
Author:Johannes Bader @viql
Description:detects some Dridex loaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments