MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95d74bd7b19308c35a9439ba6a4b494b9a633ac9c5026e9b6127a2def24ffa3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 95d74bd7b19308c35a9439ba6a4b494b9a633ac9c5026e9b6127a2def24ffa3f
SHA3-384 hash: 34f95d9890ba111a097ad561dc644399a7d7b66a332864ea260086b32c20ba42cdcb06d9fd5233f90d128829a9f8ed33
SHA1 hash: d71bc5a4d7e6d43d408760f8718b75136a208ecc
MD5 hash: ca4d8376794830f2c46e5b32ce24b51e
humanhash: earth-jupiter-east-fanta
File name:qmzo.exe
Download: download sample
Signature Dridex
File size:282'624 bytes
First seen:2020-04-22 17:35:31 UTC
Last seen:2020-04-22 19:37:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 643cdcf7c42fa56b19080e372ca127c0 (1 x Dridex)
ssdeep 3072:gQDRfsRZYCdnOBOKN2KYe6i53ZMAJ2unU6uPIKPTNjDK7EinItZGx0LWJAYlAYoe:5TGnOQW1Ye6i5ounGPFIEWAM6L
Threatray 75 similar samples on MalwareBazaar
TLSH 36540242E741B88DE817823164C39D6A6031ED37BD5ADD6376983E1B3E7ED22D902363
Reporter abuse_ch
Tags:COVID-19 Dridex exe GMX


Avatar
abuse_ch
COVID-19 themed malspam sent from GMX mailserver, distributing Dridex:

HELO: mout.gmx.net
Sending IP: 212.227.17.20
From: Sephira Bobinette <Silvia.Gronewald3533840@gmx.com>
Subject: RE: Review COVID-10 Policy
Attachment: covid19_753651.xls

Dridex payload URL:
http://toliku.com/qmzo.exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2020-04-22 17:47:19 UTC
File Type:
PE (Exe)
Extracted files:
37
AV detection:
26 of 28 (92.86%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Dridex

Executable exe 95d74bd7b19308c35a9439ba6a4b494b9a633ac9c5026e9b6127a2def24ffa3f

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationUSER32.dll::GetUserObjectSecurity
WIN_BASE_APIUses Win Base APIKERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::GetConsoleCP

Comments