MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cd27e2b49870da39e71fdb5c7b858b1548f351aa16e14df939103c75aa8aefd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 5cd27e2b49870da39e71fdb5c7b858b1548f351aa16e14df939103c75aa8aefd
SHA3-384 hash: 9c80611e070259693fb78712c9cf5aaadce24e68dd46615914a1ff56ea126651324905edf57eca109deb08c15fe548a8
SHA1 hash: 4b73752f64ca6bb9cbf04bf4d66da600171a6bd1
MD5 hash: af7d96e44e0548b42b0dd38277b8d232
humanhash: robin-delaware-virginia-island
File name:dxgi.dll
Download: download sample
Signature Dridex
File size:704'512 bytes
First seen:2020-06-26 08:58:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 26fdc69b9b50c000107935f1b4954aca (3 x Dridex)
ssdeep 12288:MeIbqChU5SQz/hgc9xizz1q+3Me71DT5gxbnynD+LTMF2:MACPCkzI14cbY+c
Threatray 29 similar samples on MalwareBazaar
TLSH 5BE4E1A3CAA111E0F143A97FB12B3A77708076272F096DE6DE3454C2AD7923D8D4B359
Reporter JAMESWT_WT
Tags:64b dll Dridex

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Changing a file
Replacing files
Reading critical registry keys
Creating a file
Creating a process from a recently created file
Deleting a recently created file
Creating a file in the %AppData% subdirectories
Reading Telegram data
Setting browser functions hooks
Forced shutdown of a system process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Unauthorized injection to a browser process
Forced shutdown of a browser
Enabling autorun with Startup directory
Threat name:
Win64.Infostealer.Dridex
Status:
Malicious
First seen:
2020-06-26 08:10:34 UTC
File Type:
PE+ (Dll)
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion trojan spyware persistence
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious behavior: EnumeratesProcesses
Suspicious use of UnmapMainImage
Checks whether UAC is enabled
Adds Run entry to start application
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments