MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9217f79feca332aeeadabed6b7b0c10bb0cdf9b1d1db5aa83a4e8ac704bf80c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 14


Intelligence 14 IOCs YARA 5 File information Comments

SHA256 hash: 9217f79feca332aeeadabed6b7b0c10bb0cdf9b1d1db5aa83a4e8ac704bf80c0
SHA3-384 hash: a1e5647f7ac325a815999f6a5028b0a9e745c54096875e8b90f1e569b0b26b7df9618dc339f06fc6f50938b4eab3f3ca
SHA1 hash: 8d793f2ec2b319b9ab4d7d6f12275d15c4c73f88
MD5 hash: 2d96e4c716eb0cf915026ed8a7d01af0
humanhash: emma-muppet-sodium-seven
File name:9217f79feca332aeeadabed6b7b0c10bb0cdf9b1d1db5aa83a4e8ac704bf80c0
Download: download sample
Signature Dridex
File size:303'104 bytes
First seen:2024-11-15 13:08:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a87d8f539263747fb5d4dc8375f1c933 (1 x Dridex)
ssdeep 3072:ejF3EAH9Z1IibJjCuS+Cu8au2cippFwPLjm2E3DkV+TJUDmKtfF7G+mbuAspFNmw:chH9Z1Ii5Cu025uL62EIEVCthblJ
TLSH T1CC549D40FA6BC172C1765870077797F69B2C2E126996C68DEBC03F56DA3C292F01972B
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
File icon (PE):PE icon
dhash icon 011d45253929e1c6 (4 x BlackGuard, 2 x CoinMiner, 1 x RedLineStealer)
Reporter JaffaCakes118
Tags:Dridex exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
746
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9217f79feca332aeeadabed6b7b0c10bb0cdf9b1d1db5aa83a4e8ac704bf80c0
Verdict:
Malicious activity
Analysis date:
2024-11-15 13:06:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
virus gates zusy
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint friedex hook packed packed packer_detected
Result
Threat name:
n/a
Detection:
malicious
Classification:
rans.spre.troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates files in alternative data streams (ADS)
Deletes itself after installation
Deletes shadow drive data (may be related to ransomware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May disable shadow drive data (uses vssadmin)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs a network lookup / discovery via ARP
Performs many domain queries via nslookup
Sigma detected: Shadow Copies Deletion Using Operating Systems Utilities
Uses nslookup.exe to query domains
Writes many files with high entropy
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1556478 Sample: D7A32F7HqO.exe Startdate: 15/11/2024 Architecture: WINDOWS Score: 100 69 250.255.255.239.in-addr.arpa 2->69 71 22.0.0.224.in-addr.arpa 2->71 73 1.1.1.1.in-addr.arpa 2->73 87 Malicious sample detected (through community Yara rule) 2->87 89 Antivirus detection for dropped file 2->89 91 Antivirus / Scanner detection for submitted sample 2->91 93 7 other signatures 2->93 9 elevation_service.exe 1001 2->9         started        13 D7A32F7HqO.exe 3 2->13         started        signatures3 process4 file5 59 C:\Users\user\AppData\Roaming\MT5YPM~1:bin, PE32 9->59 dropped 61 C:\Program Files\...\progress_circle_icon.svg, COM 9->61 dropped 63 C:\Program Files\Adobe\...\help.svg, COM 9->63 dropped 67 193 other malicious files 9->67 dropped 95 Infects executable files (exe, dll, sys, html) 9->95 15 MT5YPM~1:bin 9->15         started        65 C:\Users\user\AppData\Roaming\K3RSUR~1:bin, PE32 13->65 dropped 97 Detected unpacking (changes PE section rights) 13->97 99 Detected unpacking (overwrites its own PE header) 13->99 101 Creates files in alternative data streams (ADS) 13->101 18 K3RSUR~1:bin 14 2 13->18         started        signatures6 process7 file8 105 Multi AV Scanner detection for dropped file 15->105 107 Detected unpacking (changes PE section rights) 15->107 109 Detected unpacking (overwrites its own PE header) 15->109 119 3 other signatures 15->119 21 nslookup.exe 15->21         started        24 nslookup.exe 15->24         started        26 nslookup.exe 15->26         started        35 27 other processes 15->35 55 C:\...\elevation_service.exe:0, PE32+ 18->55 dropped 57 C:\...\elevation_service.exe, PE32 18->57 dropped 111 May disable shadow drive data (uses vssadmin) 18->111 113 Deletes shadow drive data (may be related to ransomware) 18->113 115 Deletes itself after installation 18->115 117 Infects executable files (exe, dll, sys, html) 18->117 28 vssadmin.exe 1 18->28         started        31 takeown.exe 1 18->31         started        33 icacls.exe 1 18->33         started        signatures9 process10 dnsIp11 75 1.1.1.1.in-addr.arpa 21->75 37 conhost.exe 21->37         started        77 1.1.1.1.in-addr.arpa 24->77 39 conhost.exe 24->39         started        79 1.1.1.1.in-addr.arpa 26->79 41 conhost.exe 26->41         started        103 Deletes shadow drive data (may be related to ransomware) 28->103 43 conhost.exe 28->43         started        45 conhost.exe 31->45         started        47 conhost.exe 33->47         started        81 1.1.1.1.in-addr.arpa 35->81 83 1.1.1.1.in-addr.arpa 35->83 85 24 other IPs or domains 35->85 49 conhost.exe 35->49         started        51 conhost.exe 35->51         started        53 25 other processes 35->53 signatures12 process13
Threat name:
Win32.Infostealer.Tinba
Status:
Malicious
First seen:
2019-05-02 15:38:52 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
genericransomware friedex emotet
Similar samples:
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery evasion execution exploit impact persistence ransomware trojan
Behaviour
Discovers systems in the same network
Interacts with shadow copies
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in System32 directory
Checks whether UAC is enabled
Drops desktop.ini file(s)
Network Service Discovery
Network Share Discovery
Deletes itself
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
Possible privilege escalation attempt
Sets service image path in registry
Windows Defender anti-emulation file check
Deletes shadow copies
Renames multiple (7798) files with added filename extension
Verdict:
Malicious
Tags:
Win.Ransomware.Friedex-6961100-0
YARA:
n/a
Unpacked files
SH256 hash:
b77c0ad59365e898d47d7e6fcb4e2235f7a699ff71d491fb3f8deada0fd547df
MD5 hash:
e04138c530d0ef20fd9ad709124ebe0b
SHA1 hash:
9a7c2dbe1f1ad2a6bbc74986a7b5761eb7072f7b
SH256 hash:
07804912e287233a21a0486f862402f403833725c8e1eab125b23fc2e85e3b57
MD5 hash:
f1ac88fc81b52ca36c5b50309d5448e5
SHA1 hash:
887feb77878d9be7e0d51ea0b2b27304e60ef4a4
Detections:
win_friedex_w0 Win32_Trojan_Dridex
SH256 hash:
9217f79feca332aeeadabed6b7b0c10bb0cdf9b1d1db5aa83a4e8ac704bf80c0
MD5 hash:
2d96e4c716eb0cf915026ed8a7d01af0
SHA1 hash:
8d793f2ec2b319b9ab4d7d6f12275d15c4c73f88
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Checking for malicious import combination that common ransomware mostly use

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Dridex

Executable exe 9217f79feca332aeeadabed6b7b0c10bb0cdf9b1d1db5aa83a4e8ac704bf80c0

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringA
WINMM.dll::midiInStart
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AttachConsole
KERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::GetConsoleCursorInfo
WIN_BASE_IO_APICan Create FilesVERSION.dll::GetFileVersionInfoSizeA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW

Comments