MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 791252fc4def3c4c3bdb270633ffc88c0e2cd8e8e8ba299825a83841a273e7dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 791252fc4def3c4c3bdb270633ffc88c0e2cd8e8e8ba299825a83841a273e7dd
SHA3-384 hash: fc291478267ed69d360d9bd1fe7b19ff9254a4970a4131d173e6e98154923c610453aa41fba4559951e4c91cd9c609c4
SHA1 hash: e45d05bf840341fbaa6fd6b9f396788c5810cb26
MD5 hash: 92aa183e338e9f7bbdc9ca401eb97c64
humanhash: blossom-floor-washington-carbon
File name:bttxlf4.zip.dll
Download: download sample
Signature Dridex
File size:765'440 bytes
First seen:2021-01-20 15:19:14 UTC
Last seen:2021-01-20 17:06:45 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 1d0c1e9a51da59fb16fe818b175c13c5 (2 x Dridex)
ssdeep 12288:F0q2AejP0XbOAQ60af2rDMmUz0x07wGwefo5SuDwadeUy:i2ejIOU0G2rDMmxxkRTs9y
Threatray 1'067 similar samples on MalwareBazaar
TLSH A1F48C63E6986460F32A073118A3A55387FC7E44CA7DCD9A31CF350B38967B1B56938E
Reporter James_inthe_box
Tags:dll Dridex

Intelligence


File Origin
# of uploads :
2
# of downloads :
162
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Sending a custom TCP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.evad
Score:
72 / 100
Signature
Detected Dridex e-Banking trojan
Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Malrep
Status:
Malicious
First seen:
2021-01-20 14:41:50 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
14 of 28 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dridex botnet loader
Behaviour
Suspicious use of WriteProcessMemory
Dridex Loader
Dridex
Malware Config
C2 Extraction:
194.225.58.214:443
211.110.44.63:5353
69.164.207.140:3388
198.57.200.100:3786
Unpacked files
SH256 hash:
379eebc83cc4ff8ad11369803136bee341497d42883cb19ee4b62c818fd6f720
MD5 hash:
7902b8fd1d30b1ad805dfae1e882a067
SHA1 hash:
1f68628b311642fcaba82a56353de3762fe8bb84
SH256 hash:
791252fc4def3c4c3bdb270633ffc88c0e2cd8e8e8ba299825a83841a273e7dd
MD5 hash:
92aa183e338e9f7bbdc9ca401eb97c64
SHA1 hash:
e45d05bf840341fbaa6fd6b9f396788c5810cb26
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DridexLoader
Author:kevoreilly
Description:Dridex v4 dropper C2 parsing function
Rule name:win_dridex_loader_v2
Author:Johannes Bader @viql
Description:detects some Dridex loaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments