Advertisement
paladin316

819Dridex_d46410402a2d0b931f3bfd2d03152591_bin_2019-09-03_15_30.txt

Sep 3rd, 2019
1,448
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.73 KB | None | 0 0
  1.  
  2. * ID: 819
  3. * MalFamily: "Malicious"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "Dridex_d46410402a2d0b931f3bfd2d03152591.bin"
  8. * File Size: 352256
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "18c7e0b2be4df75f52d9292d4255537e04db4ca56499c3c40b5a4348a7a5dd08"
  11. * MD5: "d46410402a2d0b931f3bfd2d03152591"
  12. * SHA1: "42633213683207e9245d61a17c23f43e8606840a"
  13. * SHA512: "4d7e3c08a0e1ed9b1832e50a7c1f88e76e30a5135f8367d12d807ace9bb04a547ffd5dd6b5befe68683cadfc3860417ef3811c6542faa9def3f9ed95daeca819"
  14. * CRC32: "F05A0690"
  15. * SSDEEP: "3072:xO+0dVObj8DsxZN+yMhojFgZjPe4GfLYqexvODGEtoqBWKxINXC4cepFrOJEvkYI:PNgC+nQgbGGqEBcur6bbvjZr"
  16.  
  17. * Process Execution:
  18. "QZuOFR.exe"
  19.  
  20.  
  21. * Executed Commands:
  22.  
  23. * Signatures Detected:
  24.  
  25. "Description": "Behavioural detection: Executable code extraction",
  26. "Details":
  27.  
  28.  
  29. "Description": "Attempts to connect to a dead IP:Port (1 unique times)",
  30. "Details":
  31.  
  32. "IP_ioc": "205.185.216.10:80"
  33.  
  34.  
  35.  
  36.  
  37. "Description": "Creates RWX memory",
  38. "Details":
  39.  
  40.  
  41. "Description": "A process attempted to delay the analysis task.",
  42. "Details":
  43.  
  44. "Process": "QZuOFR.exe tried to sleep 473 seconds, actually delayed analysis time by 0 seconds"
  45.  
  46.  
  47.  
  48.  
  49. "Description": "The binary likely contains encrypted or compressed data.",
  50. "Details":
  51.  
  52. "section": "name: |VT9T, entropy: 7.93, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE, raw_size: 0x00021000, virtual_size: 0x0002082d"
  53.  
  54.  
  55.  
  56.  
  57. "Description": "Collects information about installed applications",
  58. "Details":
  59.  
  60. "Program": "Microsoft Office Shared 64-bit MUI 2013"
  61.  
  62.  
  63. "Program": "Google Update Helper"
  64.  
  65.  
  66.  
  67.  
  68. "Program": "Microsoft Excel MUI 2013"
  69.  
  70.  
  71. "Program": "Microsoft Outlook MUI 2013"
  72.  
  73.  
  74.  
  75.  
  76. "Program": "Google Chrome"
  77.  
  78.  
  79.  
  80.  
  81. "Program": "Notepad++"
  82.  
  83.  
  84. "Program": "Microsoft Office Proofing Tools 2013 - Espa\\xc3\\xb1ol"
  85.  
  86.  
  87. "Program": "Adobe Flash Player 29 ActiveX"
  88.  
  89.  
  90.  
  91.  
  92. "Program": "Microsoft Access MUI 2013"
  93.  
  94.  
  95. "Program": "Microsoft Office 64-bit Components 2013"
  96.  
  97.  
  98. "Program": "Microsoft Office Proofing Tools 2013 - English"
  99.  
  100.  
  101. "Program": "Adobe Flash Player 29 NPAPI"
  102.  
  103.  
  104. "Program": "Adobe Acrobat Reader DC"
  105.  
  106.  
  107. "Program": "Adobe Refresh Manager"
  108.  
  109.  
  110. "Program": "Microsoft Publisher MUI 2013"
  111.  
  112.  
  113. "Program": "Microsoft DCF MUI 2013"
  114.  
  115.  
  116.  
  117.  
  118. "Program": "Microsoft Office Shared MUI 2013"
  119.  
  120.  
  121. "Program": "Microsoft Office OSM MUI 2013"
  122.  
  123.  
  124. "Program": "Microsoft InfoPath MUI 2013"
  125.  
  126.  
  127. "Program": "Microsoft Office Shared Setup Metadata MUI 2013"
  128.  
  129.  
  130. "Program": "Outils de v\\xc3\\xa9rification linguistique 2013 de Microsoft Office\\xc2\\xa0- Fran\\xc3\\xa7ais"
  131.  
  132.  
  133. "Program": "Microsoft Word MUI 2013"
  134.  
  135.  
  136.  
  137.  
  138.  
  139.  
  140.  
  141.  
  142. "Program": "Microsoft Groove MUI 2013"
  143.  
  144.  
  145. "Program": "Oracle VM VirtualBox Guest Additions 6.0.2"
  146.  
  147.  
  148.  
  149.  
  150.  
  151.  
  152. "Program": "Microsoft Office Shared 64-bit Setup Metadata MUI 2013"
  153.  
  154.  
  155. "Program": "Microsoft Access Setup Metadata MUI 2013"
  156.  
  157.  
  158. "Program": "Microsoft Office OSM UX MUI 2013"
  159.  
  160.  
  161. "Program": "Java Auto Updater"
  162.  
  163.  
  164. "Program": "Microsoft PowerPoint MUI 2013"
  165.  
  166.  
  167. "Program": "Microsoft Office Professional Plus 2013"
  168.  
  169.  
  170. "Program": "Java 8 Update 201"
  171.  
  172.  
  173. "Program": "Microsoft Office Proofing 2013"
  174.  
  175.  
  176. "Program": "Microsoft Lync MUI 2013"
  177.  
  178.  
  179.  
  180.  
  181.  
  182.  
  183. "Program": "Microsoft OneNote MUI 2013"
  184.  
  185.  
  186.  
  187.  
  188. "Description": "File has been identified by 17 Antiviruses on VirusTotal as malicious",
  189. "Details":
  190.  
  191. "FireEye": "Generic.mg.d46410402a2d0b93"
  192.  
  193.  
  194. "Cylance": "Unsafe"
  195.  
  196.  
  197. "K7AntiVirus": "Trojan ( 00549d461 )"
  198.  
  199.  
  200. "K7GW": "Trojan ( 00549d461 )"
  201.  
  202.  
  203. "Cybereason": "malicious.368320"
  204.  
  205.  
  206. "Invincea": "heuristic"
  207.  
  208.  
  209. "Symantec": "Trojan.Emotet"
  210.  
  211.  
  212. "APEX": "Malicious"
  213.  
  214.  
  215. "Rising": "Trojan.Generic@ML.95 (RDML:rMOXKkXVceOb9RzWegSziA)"
  216.  
  217.  
  218. "SentinelOne": "DFI - Malicious PE"
  219.  
  220.  
  221. "Microsoft": "Trojan:Win32/Casur.A!cl"
  222.  
  223.  
  224. "Endgame": "malicious (high confidence)"
  225.  
  226.  
  227. "Acronis": "suspicious"
  228.  
  229.  
  230. "VBA32": "TScope.Malware-Cryptor.SB"
  231.  
  232.  
  233. "Webroot": "W32.Trojan.Emotet"
  234.  
  235.  
  236. "CrowdStrike": "win/malicious_confidence_100% (W)"
  237.  
  238.  
  239. "Qihoo-360": "HEUR/QVM20.1.A409.Malware.Gen"
  240.  
  241.  
  242.  
  243.  
  244. "Description": "Detects VirtualBox through the presence of a registry key",
  245. "Details":
  246.  
  247.  
  248. "Description": "Created network traffic indicative of malicious activity",
  249. "Details":
  250.  
  251. "signature": "ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex)"
  252.  
  253.  
  254.  
  255.  
  256.  
  257. * Started Service:
  258.  
  259. * Mutexes:
  260. "DBWinMutex"
  261.  
  262.  
  263. * Modified Files:
  264. "C:\\Users\\user\\AppData\\LocalLow\\Microsoft\\CryptnetUrlCache\\MetaData\\94308059B57B3142E455B38A6EB92015",
  265. "C:\\Users\\user\\AppData\\LocalLow\\Microsoft\\CryptnetUrlCache\\Content\\94308059B57B3142E455B38A6EB92015"
  266.  
  267.  
  268. * Deleted Files:
  269.  
  270. * Modified Registry Keys:
  271.  
  272. * Deleted Registry Keys:
  273.  
  274. * DNS Communications:
  275.  
  276. * Domains:
  277.  
  278. * Network Communication - ICMP:
  279.  
  280. * Network Communication - HTTP:
  281.  
  282. * Network Communication - SMTP:
  283.  
  284. * Network Communication - Hosts:
  285.  
  286. "country_name": "United States",
  287. "ip": "198.61.168.254",
  288. "inaddrarpa": "",
  289. "hostname": ""
  290.  
  291.  
  292. "country_name": "United States",
  293. "ip": "198.199.106.229",
  294. "inaddrarpa": "",
  295. "hostname": ""
  296.  
  297.  
  298. "country_name": "United States",
  299. "ip": "104.247.221.104",
  300. "inaddrarpa": "",
  301. "hostname": ""
  302.  
  303.  
  304.  
  305. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement