MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6a05f362aa3b7f597181f694af55d4bddff4cf3e54798dae7fe884dd1faa0494. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments 1

SHA256 hash: 6a05f362aa3b7f597181f694af55d4bddff4cf3e54798dae7fe884dd1faa0494
SHA3-384 hash: 64a4a661ad79e90196046a26b9ff78e5c7bffcf4b6a56f2f0c1586dd7c716d8be25b4ebe3945f6503f50659df5813f99
SHA1 hash: 5635d8802c11ebfae0f1e01de2d4782615035c43
MD5 hash: 9664f0bfe2808c95b4bf6e828ded2e83
humanhash: floor-alabama-steak-venus
File name:axel.exe
Download: download sample
Signature Dridex
File size:212'992 bytes
First seen:2020-03-31 17:30:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b55e0209d8226eba7d6c6a40289274f9 (2 x Dridex)
ssdeep 3072:VZkePTngCnDGL00+pOUNG0AR5PyCvvTtvY5qhhN+7mSTv2dmqX9vvRemGM5TB4GO:3lbgN0lGl5PyKX+gtX9VLdB4Gd7
Threatray 124 similar samples on MalwareBazaar
TLSH EB24022167E6E950E0F70B3C68786B4627357D218B72C85EF6586B8EC1B6B10DC35F22
Reporter abuse_ch
Tags:Dridex exe


Avatar
abuse_ch
Dridex malspam emitted from GMX mailservers (compromised email accounts?):

HELO: mout.gmx.net
Sending IP: 212.227.17.20
From: Mair Eryn <Rosaura.Rafiq8527633@gmx.com>
Subject: Invoice Due #761932
Attachment: invo_761932.xls

Dridex payload delivery URLs:
http://fikima.com/axel.exe
http://lonoth.com/jokx.exe
http://bellque.com/axel.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Dridex
Status:
Malicious
First seen:
2020-03-31 17:55:57 UTC
File Type:
PE (Exe)
AV detection:
25 of 31 (80.65%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_dridex_g2
Author:Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Dridex

Executable exe 6a05f362aa3b7f597181f694af55d4bddff4cf3e54798dae7fe884dd1faa0494

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments



Avatar
commented on 2020-03-31 17:42:58 UTC

Dridex C2s:
185.47.129.30:443
158.69.234.15:691
87.106.7.163:3886
107.170.158.58:1443