General

  • Target

    Qdfo3phy.dll

  • Size

    668KB

  • Sample

    201103-78l9k5mty6

  • MD5

    e16a166beb4c710daa177c316febf54c

  • SHA1

    4f2c2e15fbf3b683bc0dfe38353d2f7eee8632a4

  • SHA256

    4ef049a69d2343a538b8563388f2a9f6838e8e864c6738b1e4934a4e377369a9

  • SHA512

    1808ce32bdc372e464a0c8567b476d6a19eac45c187affc3216bdd98d3f7374fce64c2589e8de84cf4781638cd1f0026148b69358cc33327653d2432ce25ccb5

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

195.154.237.245:443

46.105.131.73:8172

91.238.160.158:18443

213.183.128.99:3786

rc4.plain
rc4.plain

Targets

    • Target

      Qdfo3phy.dll

    • Size

      668KB

    • MD5

      e16a166beb4c710daa177c316febf54c

    • SHA1

      4f2c2e15fbf3b683bc0dfe38353d2f7eee8632a4

    • SHA256

      4ef049a69d2343a538b8563388f2a9f6838e8e864c6738b1e4934a4e377369a9

    • SHA512

      1808ce32bdc372e464a0c8567b476d6a19eac45c187affc3216bdd98d3f7374fce64c2589e8de84cf4781638cd1f0026148b69358cc33327653d2432ce25ccb5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks