General

  • Target

    nbuqngtd.dll

  • Size

    532KB

  • Sample

    201111-b76jcfxhhn

  • MD5

    c151c22bf1425d8adfa4313ee1f2387c

  • SHA1

    a18a5feb2495d5daeae01be7ae4a0ae58b233278

  • SHA256

    b7416f6229dae7bc167f6f18c25b993c7c11a88a139a77178102bd7ca84c469c

  • SHA512

    9748d5c307facc0a819816ec00fb60c975cbdaa534df5ab6871396f25a258930f45aaeac7d17e8d2e20012ac29cf678510c601914e11b4c965380154d668e170

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

77.220.64.39:443

69.164.207.140:3388

78.47.139.43:4443

103.244.206.74:33443

rc4.plain
rc4.plain

Targets

    • Target

      nbuqngtd.dll

    • Size

      532KB

    • MD5

      c151c22bf1425d8adfa4313ee1f2387c

    • SHA1

      a18a5feb2495d5daeae01be7ae4a0ae58b233278

    • SHA256

      b7416f6229dae7bc167f6f18c25b993c7c11a88a139a77178102bd7ca84c469c

    • SHA512

      9748d5c307facc0a819816ec00fb60c975cbdaa534df5ab6871396f25a258930f45aaeac7d17e8d2e20012ac29cf678510c601914e11b4c965380154d668e170

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks