yh0aj4z[1].pdf.zip

General
Target

yh0aj4z[1].pdf.zip

Size

263KB

Sample

201112-e66449gfaj

Score
10 /10
MD5

41132dd8be83afdedf51befdb5c6870e

SHA1

aacb327d5eb7300340284b4d1f5562a0f6083dd0

SHA256

b271b962d79730c73596a8881eb02727736820bb6cd8071c8d81e6d4dc7a951e

SHA512

08fcd24540c25b0d89e6e437e1325887e645c71a8d60d2e35fabbe04f98399190c4b9b9d2708aeeb96af964eec2729dbaf1b126e6ee1ea049e0de99fd1c9c8a5

Malware Config

Extracted

Family dridex
Botnet 10444
C2

77.220.64.39:443

69.164.207.140:3388

78.47.139.43:4443

103.244.206.74:33443

rc4.plain
rc4.plain
Targets
Target

yh0aj4z[1].pdf

MD5

ee69629c63e45daebdd031f840562b34

Filesize

556KB

Score
10 /10
SHA1

302b7da0d9472c75869d6c48eee9fb6b652dc618

SHA256

d7093640c50ebce8ea387148099bb0e30c9387d2748f728f10398dfd4e365450

SHA512

43033b847b28c5781b65d18a8ba898a6572b5b687b46ac03318604ee9e8aad6964f723265bb1375eecc0b66a411955823540661e1e2c3da29466a060804a5419

Tags

Signatures

  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    Tags

  • Dridex Loader

    Description

    Detects Dridex both x86 and x64 loader in memory.

    Tags

  • Blocklisted process makes network request

  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Tasks

                        static1

                        behavioral2

                        10/10