General

  • Target

    2487c00280cec1bb0f5cbca39b93cb1ee44335341ee67f21101a076e6f43e152

  • Size

    188KB

  • Sample

    210224-km8xq88gma

  • MD5

    7ca3cfaf20855dab72958f16704dabd1

  • SHA1

    f99f30bca854406ab650fc5b2366b7e816e07efa

  • SHA256

    2487c00280cec1bb0f5cbca39b93cb1ee44335341ee67f21101a076e6f43e152

  • SHA512

    3372faad47548409884064ce182123b05e889ef82c2140dddc689f871b07e4590b08470a28a2e3fa3e2032cee90ed4c82314ad63db92eaa3adfeeadf6aaa4295

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      2487c00280cec1bb0f5cbca39b93cb1ee44335341ee67f21101a076e6f43e152

    • Size

      188KB

    • MD5

      7ca3cfaf20855dab72958f16704dabd1

    • SHA1

      f99f30bca854406ab650fc5b2366b7e816e07efa

    • SHA256

      2487c00280cec1bb0f5cbca39b93cb1ee44335341ee67f21101a076e6f43e152

    • SHA512

      3372faad47548409884064ce182123b05e889ef82c2140dddc689f871b07e4590b08470a28a2e3fa3e2032cee90ed4c82314ad63db92eaa3adfeeadf6aaa4295

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks