MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b66a5d391335b6dc827225b6531f172151d8a87c7514de789bcaf1999b0645ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: b66a5d391335b6dc827225b6531f172151d8a87c7514de789bcaf1999b0645ff
SHA3-384 hash: 2bf26dd833a5e0c2836551ae172e76ab38c8331f01135e70d94ef9f31eb6dbea4064d7d850c60a3b2cb8f8db056b2921
SHA1 hash: 6bc9bdb529d692cf0369db7f95a9e71eb7b74b6c
MD5 hash: 4f368bfca1b7b37c26062ed76b52326c
humanhash: white-bluebird-nevada-california
File name:4qohdkiq
Download: download sample
Signature Dridex
File size:362'496 bytes
First seen:2020-07-13 13:10:21 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash de9062becd61548f72043a3bf13702da (3 x Dridex)
ssdeep 6144:UeD0t+ixyCGpuhFU4gUtcxtPYvbofsEuQHZAsyg1zk:zD0t+EyLqFEUtkPYJ5QH
Threatray 157 similar samples on MalwareBazaar
TLSH 4D745A71388EE475F6061B3E8D02E1BC5655BC92CB78B8D331EB1E6F972B18746603A4
Reporter JAMESWT_WT
Tags:Dridex

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2020-07-13 13:12:06 UTC
File Type:
PE (Dll)
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
evasion trojan discovery
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Checks whether UAC is enabled
Checks for installed software on the system
Checks whether UAC is enabled
Checks for installed software on the system
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments