MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bb26c9f976e5cd4a63cc57453d42eeffa93c9522074eaa20042ea1eb9c7a1100. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Dridex
Vendor detections: 14
| SHA256 hash: | bb26c9f976e5cd4a63cc57453d42eeffa93c9522074eaa20042ea1eb9c7a1100 |
|---|---|
| SHA3-384 hash: | 57213c5f9b6f41113c13368842fec8e74e44d57ed2d7f942bbf14e6dc101c2a11f926776ae3b8d779fdf7cbf7646c7a7 |
| SHA1 hash: | 1f844d912d1662e9eecf84e76bec1c0c46c06ec9 |
| MD5 hash: | 53b7dfea4f16dc18640e9819559373f0 |
| humanhash: | river-stairway-triple-nebraska |
| File name: | 53b7dfea4f16dc18640e9819559373f0 |
| Download: | download sample |
| Signature | Dridex |
| File size: | 487'424 bytes |
| First seen: | 2021-12-06 20:53:57 UTC |
| Last seen: | 2021-12-06 22:37:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | aa6cc8ff2bfdc2453ad6946bef320766 (9 x Dridex) |
| ssdeep | 12288:CCfzehtApz4lzQvzU3H2Jz+BbAt3A1NkpzBTf/o1VlkOZVjWRs:CCfzehtApz4lzQvzU3H2Jz+BbAt3A1NN |
| Threatray | 5'587 similar samples on MalwareBazaar |
| TLSH | T159A4BF4FEEF690B5FA32F8B134528292E1CB9C752002B7D485616A58FCE5C7F648D8C9 |
| Reporter | |
| Tags: | 32 dll Dridex exe |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
151.106.39.36:8116
103.124.144.123:6891
172.105.78.60:4664
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DridexLoader |
|---|---|
| Author: | kevoreilly |
| Description: | Dridex v4 dropper C2 parsing function |
| Rule name: | DridexV4 |
|---|---|
| Author: | kevoreilly |
| Description: | Dridex v4 Payload |
| Rule name: | dridex_loader |
|---|---|
| Author: | kevoreilly |
| Description: | Dridex Loader |
| Rule name: | INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture |
|---|---|
| Author: | ditekSHen |
| Description: | Detect executables with stomped PE compilation timestamp that is greater than local current time |
| Rule name: | MALWARE_Win_DLLLoader |
|---|---|
| Author: | ditekSHen |
| Description: | Detects unknown DLL Loader |
| Rule name: | win_doppeldridex_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.doppeldridex. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://inventiontimestamp.com/kvwzpn9ch.jpg