MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd4ccf6b266b11aa29327444754c4c42f175725c4c03e21cf5dae151a4c4aa41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Dridex


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: cd4ccf6b266b11aa29327444754c4c42f175725c4c03e21cf5dae151a4c4aa41
SHA3-384 hash: 9194c30b60c7dec9b58ae7a45ab859c352a6a3c30bc9741ea352c782c86ffc71ed4824f42835483537baa70a9c3d9b8c
SHA1 hash: 73c05bd6ee0d49a8202d4ec4b4a90e27a1aa3174
MD5 hash: 8c115bfae5facea4fd720b5bbe39136d
humanhash: stairway-burger-bulldog-berlin
File name:DRIDEX (4)
Download: download sample
Signature Dridex
File size:327'680 bytes
First seen:2020-09-24 07:37:23 UTC
Last seen:2020-09-24 08:37:06 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 0711eaedc93119f4fba09fc656e118ab (7 x Dridex)
ssdeep 3072:j4LaiXGwW6f3ny73vo0FbxbqOwO42GLSGL5UUoIPjgbgba5ytyiqNTPmSvld2hJk:jBrwXy7wvxSGGJIPje15Nvld3s5pd
Threatray 34 similar samples on MalwareBazaar
TLSH 4D64E1113AE65929F6B36B708DBB05048F1F7E912C3C81CE86111B5A9A63640CFE7FB5
Reporter JAMESWT_WT
Tags:Dridex

Intelligence


File Origin
# of uploads :
2
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 289480 Sample: DRIDEX (4) Startdate: 24/09/2020 Architecture: WINDOWS Score: 52 10 Multi AV Scanner detection for submitted file 2->10 12 Machine Learning detection for sample 2->12 6 loaddll32.exe 1 2->6         started        process3 process4 8 WerFault.exe 3 9 6->8         started       
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2020-09-24 02:15:00 UTC
File Type:
PE (Dll)
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
botnet loader family:dridex
Behaviour
Suspicious use of WriteProcessMemory
Dridex Loader
Dridex
Malware Config
C2 Extraction:
151.236.219.181:443
142.4.6.57:14043
162.144.127.197:3786
103.40.116.68:5443
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Dridex

DLL dll cd4ccf6b266b11aa29327444754c4c42f175725c4c03e21cf5dae151a4c4aa41

(this sample)

Comments