General

  • Target

    c30b5746271fe4d4f3af7d6de38356a1da42c3117ad50cf1066631f6f91aa414

  • Size

    184KB

  • Sample

    210226-rc84ene4l6

  • MD5

    440f2909995e9485edc3ed99306b5138

  • SHA1

    b9b4160decfac311484a8b2f9e95d6c1654dfddf

  • SHA256

    c30b5746271fe4d4f3af7d6de38356a1da42c3117ad50cf1066631f6f91aa414

  • SHA512

    f55acb42b452551718a850b56b593272cc3af39cbdad2d70b8e35910dd7f1cab8495d5c42497b703258abe41464d4cb5f8bb478ffa9480ba897a22e36fcff608

Malware Config

Extracted

Family

dridex

Botnet

111

C2

162.13.114.59:443

70.39.99.196:8172

37.187.115.122:6601

rc4.plain
rc4.plain

Targets

    • Target

      c30b5746271fe4d4f3af7d6de38356a1da42c3117ad50cf1066631f6f91aa414

    • Size

      184KB

    • MD5

      440f2909995e9485edc3ed99306b5138

    • SHA1

      b9b4160decfac311484a8b2f9e95d6c1654dfddf

    • SHA256

      c30b5746271fe4d4f3af7d6de38356a1da42c3117ad50cf1066631f6f91aa414

    • SHA512

      f55acb42b452551718a850b56b593272cc3af39cbdad2d70b8e35910dd7f1cab8495d5c42497b703258abe41464d4cb5f8bb478ffa9480ba897a22e36fcff608

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks