ed15f59b17a7ef869377647bbf500718.dll

General
Target

ed15f59b17a7ef869377647bbf500718.dll

Size

551KB

Sample

201120-jpkwf9ckm6

Score
10 /10
MD5

ed15f59b17a7ef869377647bbf500718

SHA1

72a2b09a4cd4c517ab6897386149d6aca291a509

SHA256

9b939f0d1dabceba231ab0ca036818ef10a813775d9a12cfc3e854819d7a7cc3

SHA512

63728cd6cfbbb15256bea25d48855e7ffe8eb83efca81d126863abe3ba2132e2292a35aafd18b827b1b47e48932272724ef65b0eda5a23a993165e632cab77e3

Malware Config

Extracted

Family dridex
Botnet 10555
C2

162.241.44.26:9443

192.232.229.53:4443

77.220.64.34:443

193.90.12.121:3098

rc4.plain
rc4.plain
Targets
Target

ed15f59b17a7ef869377647bbf500718.dll

MD5

ed15f59b17a7ef869377647bbf500718

Filesize

551KB

Score
10 /10
SHA1

72a2b09a4cd4c517ab6897386149d6aca291a509

SHA256

9b939f0d1dabceba231ab0ca036818ef10a813775d9a12cfc3e854819d7a7cc3

SHA512

63728cd6cfbbb15256bea25d48855e7ffe8eb83efca81d126863abe3ba2132e2292a35aafd18b827b1b47e48932272724ef65b0eda5a23a993165e632cab77e3

Tags

Signatures

  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    Tags

  • Dridex Loader

    Description

    Detects Dridex both x86 and x64 loader in memory.

    Tags

  • Blocklisted process makes network request

  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Tasks