General

  • Target

    djzi3.bin.zip

  • Size

    235KB

  • Sample

    210217-zsl5zczx12

  • MD5

    d15c338d5519b4ea827cdd28aef7fdc8

  • SHA1

    6e8f06af41cff69844f065d5eaf7d46af15a8af1

  • SHA256

    9a5c77621e2375a1a780155372914bd89708812db332c7921f03e1980bf3d83a

  • SHA512

    78299d6adf9ef806efe266d4dbcbdbcc1a6e812e372698d0e5d4f5c0074676b7b7e0662d9d15578e2a8945156a9642470122cb288086379da853cefcd63247ab

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

188.165.17.91:8443

185.216.27.185:8172

182.254.209.230:6516

rc4.plain
rc4.plain

Targets

    • Target

      djzi3.bin

    • Size

      1.3MB

    • MD5

      86954f76b5c0fbb1cb6ea492711869e2

    • SHA1

      081e3460fc0c6e6e6cd1b17b4a8f6b949a88db02

    • SHA256

      ffd6ae5e716b2cade6d3365fb9440a5a67f37d3c249d78bdea9e5ef3d39ce52c

    • SHA512

      4b77cff3caf6966c50bcde7185173ae5c536058e1cd29d05bf439b6021572d856e40af547f22270c7c91bd13aaf3f76941eab9bc298a52724e965067d9825e69

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks