General

  • Target

    q7sg81mqzrar

  • Size

    551KB

  • Sample

    201102-xng2bp2hcx

  • MD5

    30a9282bf77aca1fcad347596364f456

  • SHA1

    79a4c1db15260ab9912c59eef7c595ee5e5abf86

  • SHA256

    75c73ab948e50702363e0eccbe49051b38807f3e78790a95bcae1cea4ae3bcbc

  • SHA512

    254aa6bb60244ba5bb6210f8a1a84a52200c70cf91644c7db829ce206623d6b838e846efa95b57c2b41b7ce4ab630d4a8bbb2d6f2e46616d59e393b36e0a27b9

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

195.154.237.245:443

46.105.131.73:8172

91.238.160.158:18443

213.183.128.99:3786

rc4.plain
rc4.plain

Targets

    • Target

      q7sg81mqzrar

    • Size

      551KB

    • MD5

      30a9282bf77aca1fcad347596364f456

    • SHA1

      79a4c1db15260ab9912c59eef7c595ee5e5abf86

    • SHA256

      75c73ab948e50702363e0eccbe49051b38807f3e78790a95bcae1cea4ae3bcbc

    • SHA512

      254aa6bb60244ba5bb6210f8a1a84a52200c70cf91644c7db829ce206623d6b838e846efa95b57c2b41b7ce4ab630d4a8bbb2d6f2e46616d59e393b36e0a27b9

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks