MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8
SHA3-384 hash: 3bdfdd245c55d4ee4fb088bb30f5d745e12ec1eeb02e5f4256e9e13de602307c1e92fe7b4445224c8cf4beccdfd84456
SHA1 hash: a5b419e570136866d793d51bc498731aa51edbe6
MD5 hash: 95cc84b83fe02e3b970397634b300816
humanhash: kentucky-football-stream-triple
File name:57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8
Download: download sample
Signature Dridex
File size:282'624 bytes
First seen:2020-11-30 13:43:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32052ab5fa2fb84174ff06f09d0e5a64 (1 x Dridex)
ssdeep 6144:dytBFn2yUMVlmPR6bBre2XjBH77SAhEy:MLFnX5VwR81HXjBbFh
Threatray 185 similar samples on MalwareBazaar
TLSH 6A541225F0AD61AEFE835B3C459996778428013392048F0FE5CAAC45B87D8C795ADF2F
Reporter JAMESWT_WT
Tags:Dridex

Intelligence


File Origin
# of uploads :
1
# of downloads :
225
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.evad
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected Dridex e-Banking trojan
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2020-10-02 02:15:07 UTC
File Type:
PE (Exe)
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dridex botnet discovery evasion loader trojan
Behaviour
Checks installed software on the system
Checks whether UAC is enabled
Dridex Loader
Dridex
Malware Config
C2 Extraction:
178.62.189.250:443
217.79.184.243:33443
195.159.28.230:4443
Unpacked files
SH256 hash:
098a1e67a7b440d70b11785e9d346fc127a19a127c6f88a724da66263476a6a0
MD5 hash:
fca3797c7971b077f75836394107c6a1
SHA1 hash:
45129113fe7b94decae4e41ab358218ff0615944
SH256 hash:
57efc1dfb758d4ed2c550e44ac01e93c71d2eaf7b0d8b4b7fd364d6f5069d9e8
MD5 hash:
95cc84b83fe02e3b970397634b300816
SHA1 hash:
a5b419e570136866d793d51bc498731aa51edbe6
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_dridex_loader_v2
Author:Johannes Bader @viql
Description:detects some Dridex loaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments