General

  • Target

    DRIDEX (4)

  • Size

    320KB

  • Sample

    200924-wlea7y1aq6

  • MD5

    8c115bfae5facea4fd720b5bbe39136d

  • SHA1

    73c05bd6ee0d49a8202d4ec4b4a90e27a1aa3174

  • SHA256

    cd4ccf6b266b11aa29327444754c4c42f175725c4c03e21cf5dae151a4c4aa41

  • SHA512

    59c5181afd29907d229518f908ba8b8ba8a5ba058c5abfa35696e7dd442ce2b0558dad8d8946ef20f0c080e1c55a42db3b5de76575fab1aebdd7645c123d89fe

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

151.236.219.181:443

142.4.6.57:14043

162.144.127.197:3786

103.40.116.68:5443

rc4.plain
rc4.plain

Targets

    • Target

      DRIDEX (4)

    • Size

      320KB

    • MD5

      8c115bfae5facea4fd720b5bbe39136d

    • SHA1

      73c05bd6ee0d49a8202d4ec4b4a90e27a1aa3174

    • SHA256

      cd4ccf6b266b11aa29327444754c4c42f175725c4c03e21cf5dae151a4c4aa41

    • SHA512

      59c5181afd29907d229518f908ba8b8ba8a5ba058c5abfa35696e7dd442ce2b0558dad8d8946ef20f0c080e1c55a42db3b5de76575fab1aebdd7645c123d89fe

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks