General

  • Target

    f781334ec51d06cb9dc8c212b96eca702a494e5145b2ef8856b004745d4848ec

  • Size

    188KB

  • Sample

    210224-83gckenw4n

  • MD5

    100f857d3147ded48d17bc58904156ce

  • SHA1

    4ae31f96751d716ca51fa304829a75808483c612

  • SHA256

    f781334ec51d06cb9dc8c212b96eca702a494e5145b2ef8856b004745d4848ec

  • SHA512

    3d05b43ce6e46d46f8c2d8a0a2f0676f52a697c777368e5a996ddc4175edcfb318485697fb1cbc9d4499941b94603b9624ae5255201f763c99531c0c0a27ecb1

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      f781334ec51d06cb9dc8c212b96eca702a494e5145b2ef8856b004745d4848ec

    • Size

      188KB

    • MD5

      100f857d3147ded48d17bc58904156ce

    • SHA1

      4ae31f96751d716ca51fa304829a75808483c612

    • SHA256

      f781334ec51d06cb9dc8c212b96eca702a494e5145b2ef8856b004745d4848ec

    • SHA512

      3d05b43ce6e46d46f8c2d8a0a2f0676f52a697c777368e5a996ddc4175edcfb318485697fb1cbc9d4499941b94603b9624ae5255201f763c99531c0c0a27ecb1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks