General

  • Target

    9b1209ef109fe7439817f9eecc2b8e9f1a5ee8b0e8148e6fceae8b2980d36ab2

  • Size

    188KB

  • Sample

    210225-5ebxym5fk2

  • MD5

    1e1fb5452efad9f98d747ed2f0dcc3a5

  • SHA1

    b1776fb23b1f78babf9dba16ce1519ae94e2bad9

  • SHA256

    9b1209ef109fe7439817f9eecc2b8e9f1a5ee8b0e8148e6fceae8b2980d36ab2

  • SHA512

    be9e4a07a53d393e658f90be0a8199f9dc115d6ea232f8ec5a0407b679ce1c7744d955ad3cf65d7dd1c3bdb825d3300c20c5c24595d61708008bdce10e89b518

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      9b1209ef109fe7439817f9eecc2b8e9f1a5ee8b0e8148e6fceae8b2980d36ab2

    • Size

      188KB

    • MD5

      1e1fb5452efad9f98d747ed2f0dcc3a5

    • SHA1

      b1776fb23b1f78babf9dba16ce1519ae94e2bad9

    • SHA256

      9b1209ef109fe7439817f9eecc2b8e9f1a5ee8b0e8148e6fceae8b2980d36ab2

    • SHA512

      be9e4a07a53d393e658f90be0a8199f9dc115d6ea232f8ec5a0407b679ce1c7744d955ad3cf65d7dd1c3bdb825d3300c20c5c24595d61708008bdce10e89b518

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks