Resubmissions

06-08-2020 16:19

200806-dwkdpetzc2 10

15-07-2020 14:08

200715-86lh36b8se 1

Analysis

  • max time kernel
    24s
  • max time network
    121s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    06-08-2020 16:19

General

  • Target

    bjsdke.exe

  • Size

    208KB

  • MD5

    89ebbc1ee8354b40737dbee5438a27e7

  • SHA1

    1fc9304746dd882fec9c8a9eea13f395b6b4b287

  • SHA256

    93c97bf3711640d5bd8ff0c2033492b2cea7b81ef2ea0e6f6b2327913e9be9d7

  • SHA512

    69a59ef21baaa559648059c7295156ac9c099fd4f8a5f1ef89fc161710dcb2e063f77637a9ef63cde212d093b97f62b8c154b42b1632e442f97498e0456d9146

Malware Config

Extracted

Family

dridex

Botnet

40400

C2

59.148.253.194:443

207.180.230.218:3389

2.58.16.87:8443

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Dridex Loader 'dmod' strings 1 IoCs

    Detects 'dmod' strings in Dridex loader.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bjsdke.exe
    "C:\Users\Admin\AppData\Local\Temp\bjsdke.exe"
    1⤵
      PID:2896

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2896-0-0x0000000010000000-0x000000001002C000-memory.dmp

      Filesize

      176KB