General

  • Target

    b62c2c3d6df852d86a4cfb57c97b7b9ccc81bbc266f0a0e979cb0b51856b60de

  • Size

    188KB

  • Sample

    210224-9x16bvf37x

  • MD5

    a0c6e2ff82b990619b986ef71604125a

  • SHA1

    bd3daab1e762ecff75e10cd1501c75a4173a9539

  • SHA256

    b62c2c3d6df852d86a4cfb57c97b7b9ccc81bbc266f0a0e979cb0b51856b60de

  • SHA512

    fef8b1b0faeba5a3f1014be19492a056f815df83e4d9018d756d7bf6f69b75e81ead2353966aab0ae468f10cef79281ca9240cd93d7c14b85eecf60a10ed9fea

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      b62c2c3d6df852d86a4cfb57c97b7b9ccc81bbc266f0a0e979cb0b51856b60de

    • Size

      188KB

    • MD5

      a0c6e2ff82b990619b986ef71604125a

    • SHA1

      bd3daab1e762ecff75e10cd1501c75a4173a9539

    • SHA256

      b62c2c3d6df852d86a4cfb57c97b7b9ccc81bbc266f0a0e979cb0b51856b60de

    • SHA512

      fef8b1b0faeba5a3f1014be19492a056f815df83e4d9018d756d7bf6f69b75e81ead2353966aab0ae468f10cef79281ca9240cd93d7c14b85eecf60a10ed9fea

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks