Analysis

  • max time kernel
    143s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    30-01-2021 21:53

General

  • Target

    47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exe

  • Size

    164KB

  • MD5

    97b55759dbaa8cff7dd388b1df7501bb

  • SHA1

    41992692046db2ce41707421f34ce7f2e8a42bec

  • SHA256

    47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96

  • SHA512

    fd92d49cc53fd17af1ccb98a7938421fdfafb71823da195d2a21371b6fbaaf4878dec63f21e164c27fc0b4df64595778d23336e0cd0069d2eab3a1783ad20ece

Malware Config

Extracted

Family

dridex

Botnet

10121

C2

87.98.218.33:443

54.38.143.246:691

159.65.79.173:3886

153.122.13.133:1443

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\47138d4dae5f0766c241e0f46e557b43b2c230774584c9e17c3176bb8cdb1f96.bin.exe"
    1⤵
    • Checks whether UAC is enabled
    PID:1740

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-2-0x00000000011E0000-0x000000000120B000-memory.dmp
    Filesize

    172KB