General

  • Target

    a99c007699589a10791326262f3dbc1e5f7de6051fd5916185321b38643eb4dd

  • Size

    188KB

  • Sample

    210224-w3e7w7ynrx

  • MD5

    efcd4286dea25d1ab1b76f6c9e49964b

  • SHA1

    0d4be7d408e0fff625858a94257dfbf8f2eb3f6f

  • SHA256

    a99c007699589a10791326262f3dbc1e5f7de6051fd5916185321b38643eb4dd

  • SHA512

    8963a95c504f614998fa4eefbb49c89f8d188fd4706c54857d39af2171d543ef6dc5880e649100601880a58c69c8d76204015480ff7b706593303aa96724bf70

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      a99c007699589a10791326262f3dbc1e5f7de6051fd5916185321b38643eb4dd

    • Size

      188KB

    • MD5

      efcd4286dea25d1ab1b76f6c9e49964b

    • SHA1

      0d4be7d408e0fff625858a94257dfbf8f2eb3f6f

    • SHA256

      a99c007699589a10791326262f3dbc1e5f7de6051fd5916185321b38643eb4dd

    • SHA512

      8963a95c504f614998fa4eefbb49c89f8d188fd4706c54857d39af2171d543ef6dc5880e649100601880a58c69c8d76204015480ff7b706593303aa96724bf70

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks