General

  • Target

    8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7

  • Size

    188KB

  • Sample

    210224-1538y3ka1j

  • MD5

    978c71c05e5ed7d1387e1219d42152dd

  • SHA1

    f29688f11a63d374520acfa5d10db7da8da661ad

  • SHA256

    8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7

  • SHA512

    9c2af417b85f6437d77ac6aa65aa6e10c626d1865805d5576c94b0e50c3b47ad4bf2677cd80bb31ea87c136253e8ece75419a0639f91a8a124c5c7b269fe295d

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7

    • Size

      188KB

    • MD5

      978c71c05e5ed7d1387e1219d42152dd

    • SHA1

      f29688f11a63d374520acfa5d10db7da8da661ad

    • SHA256

      8127f70097cd1bbadc3cf930084fc773201483eba4ecba24ed7a06c573680da7

    • SHA512

      9c2af417b85f6437d77ac6aa65aa6e10c626d1865805d5576c94b0e50c3b47ad4bf2677cd80bb31ea87c136253e8ece75419a0639f91a8a124c5c7b269fe295d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks