General

  • Target

    daaf3e4923eee5fa1706a4f65ae9409a.dll

  • Size

    236KB

  • Sample

    210121-9qwtw9p696

  • MD5

    daaf3e4923eee5fa1706a4f65ae9409a

  • SHA1

    297c5404f107d3a6b925a17852c8256fe84e7a40

  • SHA256

    f6958b6419aa600cedccb269ab7727319c7bab43bf0a99f5e2a3e9e2565b27e0

  • SHA512

    f459bbabda38dc3b2edd05be7c0ad02133e6fec08eb039a5d0d08d6b552ad4050568801951016be3ad1006afcba890691042e9c766bb4f843b3b5312c719832c

Malware Config

Extracted

Family

dridex

Botnet

111

C2

77.220.64.40:443

8.4.9.152:3786

185.246.87.202:3098

rc4.plain
rc4.plain

Targets

    • Target

      daaf3e4923eee5fa1706a4f65ae9409a.dll

    • Size

      236KB

    • MD5

      daaf3e4923eee5fa1706a4f65ae9409a

    • SHA1

      297c5404f107d3a6b925a17852c8256fe84e7a40

    • SHA256

      f6958b6419aa600cedccb269ab7727319c7bab43bf0a99f5e2a3e9e2565b27e0

    • SHA512

      f459bbabda38dc3b2edd05be7c0ad02133e6fec08eb039a5d0d08d6b552ad4050568801951016be3ad1006afcba890691042e9c766bb4f843b3b5312c719832c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks