General

  • Target

    649fa81cffabbb7dcdd2918c59f284a08f4168ecb8da5ba169ef6049805fd577

  • Size

    188KB

  • Sample

    210225-y1gg44azl6

  • MD5

    2db21ba9057ffc4347ee0bca1ddf4ea2

  • SHA1

    ba0950c79bbe9991fd3d00f601983e87fc9ce04b

  • SHA256

    649fa81cffabbb7dcdd2918c59f284a08f4168ecb8da5ba169ef6049805fd577

  • SHA512

    feb81e17744652f7441664434540c7d72981341123907f942e45c8e36959254572c10a37815a256594ca7fc9dc44bd88d54252351d3330d30e3ba0ca500c3d6d

Malware Config

Extracted

Family

dridex

Botnet

111

C2

209.151.236.42:443

91.121.94.86:8172

5.189.144.136:6516

rc4.plain
rc4.plain

Targets

    • Target

      649fa81cffabbb7dcdd2918c59f284a08f4168ecb8da5ba169ef6049805fd577

    • Size

      188KB

    • MD5

      2db21ba9057ffc4347ee0bca1ddf4ea2

    • SHA1

      ba0950c79bbe9991fd3d00f601983e87fc9ce04b

    • SHA256

      649fa81cffabbb7dcdd2918c59f284a08f4168ecb8da5ba169ef6049805fd577

    • SHA512

      feb81e17744652f7441664434540c7d72981341123907f942e45c8e36959254572c10a37815a256594ca7fc9dc44bd88d54252351d3330d30e3ba0ca500c3d6d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks