General

  • Target

    b6zicn.zip.dll

  • Size

    524KB

  • Sample

    201112-dctl5fhbss

  • MD5

    2b30b2bf8b20ef4f44ac2cf7ebeff137

  • SHA1

    a6b7156c416a7bd0386655754e043369faa25c02

  • SHA256

    180a6935034ffeac72d7f1d0bd6fcb1efc21dda1b7408865a414a7ba683678f9

  • SHA512

    8f742817222f8568faf15a34f860d77b610c61619cbc3b9d80e37db0f1bfe18ff01f52226eb3856c45959bf16e658d7af3922fd30018bb3080b2cea2ac119db3

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

77.220.64.39:443

69.164.207.140:3388

78.47.139.43:4443

103.244.206.74:33443

rc4.plain
rc4.plain

Targets

    • Target

      b6zicn.zip.dll

    • Size

      524KB

    • MD5

      2b30b2bf8b20ef4f44ac2cf7ebeff137

    • SHA1

      a6b7156c416a7bd0386655754e043369faa25c02

    • SHA256

      180a6935034ffeac72d7f1d0bd6fcb1efc21dda1b7408865a414a7ba683678f9

    • SHA512

      8f742817222f8568faf15a34f860d77b610c61619cbc3b9d80e37db0f1bfe18ff01f52226eb3856c45959bf16e658d7af3922fd30018bb3080b2cea2ac119db3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks