General

  • Target

    g78zqs1w.rar.dll

  • Size

    590KB

  • Sample

    201029-rnafrkzptx

  • MD5

    94125438dc1fcccd0c80567f0187718b

  • SHA1

    091d5f6d69be3b52cbe9dc5976092a420ed6cbdd

  • SHA256

    61ec25c0d71e16e8208d3b2ccb2c7f7b9f5580c992e538d256393d8085919560

  • SHA512

    5966b6156c1b3748a56ea0d21d23799a54e5f1579d490224c72ee9645c45cf955b006572057a453c9f586f7ccc8490da704e3bc7c664b048224066df30dd7d76

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

77.220.64.55:443

51.254.163.104:1688

165.22.65.75:3388

103.41.110.115:33443

rc4.plain
rc4.plain

Targets

    • Target

      g78zqs1w.rar.dll

    • Size

      590KB

    • MD5

      94125438dc1fcccd0c80567f0187718b

    • SHA1

      091d5f6d69be3b52cbe9dc5976092a420ed6cbdd

    • SHA256

      61ec25c0d71e16e8208d3b2ccb2c7f7b9f5580c992e538d256393d8085919560

    • SHA512

      5966b6156c1b3748a56ea0d21d23799a54e5f1579d490224c72ee9645c45cf955b006572057a453c9f586f7ccc8490da704e3bc7c664b048224066df30dd7d76

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks