General

  • Target

    ed6a58716eb98ff093b53de612e456ee7c958201a667528daa43573ae90d2c4a

  • Size

    188KB

  • Sample

    210303-am2mkravss

  • MD5

    ae05f6f326540917501432ec2895ae9b

  • SHA1

    217aab5e03cf15d531bd87056c9165d098ab8537

  • SHA256

    ed6a58716eb98ff093b53de612e456ee7c958201a667528daa43573ae90d2c4a

  • SHA512

    a9432c4b505ce39ab9183663cd6156715ec7fbfec814b23c6eb02f1e9951ee97a1a83ac8e48ca7cf3895314f3006c0a58318ca96d4847cd6256340235e54f055

Malware Config

Extracted

Family

dridex

Botnet

111

C2

116.251.211.158:443

216.10.242.142:6601

37.247.35.137:6601

rc4.plain
rc4.plain

Targets

    • Target

      ed6a58716eb98ff093b53de612e456ee7c958201a667528daa43573ae90d2c4a

    • Size

      188KB

    • MD5

      ae05f6f326540917501432ec2895ae9b

    • SHA1

      217aab5e03cf15d531bd87056c9165d098ab8537

    • SHA256

      ed6a58716eb98ff093b53de612e456ee7c958201a667528daa43573ae90d2c4a

    • SHA512

      a9432c4b505ce39ab9183663cd6156715ec7fbfec814b23c6eb02f1e9951ee97a1a83ac8e48ca7cf3895314f3006c0a58318ca96d4847cd6256340235e54f055

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks