General

  • Target

    a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2

  • Size

    188KB

  • Sample

    210303-bjqxty1fqa

  • MD5

    ae5da20f4f221b17589dd6fc053fdc03

  • SHA1

    5596c5e9eb87c1e1d7a48529bd56d9b2c576580c

  • SHA256

    a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2

  • SHA512

    2ce1751beea1481c942f6cb316cd9e42322e03cfd98b400b95d3ad5d95e59112fb34d45343856dec5cf284355cbf3b4babfaf7ce28139b52133d6edde0a057c8

Malware Config

Extracted

Family

dridex

Botnet

111

C2

116.251.211.158:443

216.10.242.142:6601

37.247.35.137:6601

rc4.plain
rc4.plain

Targets

    • Target

      a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2

    • Size

      188KB

    • MD5

      ae5da20f4f221b17589dd6fc053fdc03

    • SHA1

      5596c5e9eb87c1e1d7a48529bd56d9b2c576580c

    • SHA256

      a70b5e51937e8bb9a512f87d16745be785e3fc0b87f6a842cb2266ef043df4a2

    • SHA512

      2ce1751beea1481c942f6cb316cd9e42322e03cfd98b400b95d3ad5d95e59112fb34d45343856dec5cf284355cbf3b4babfaf7ce28139b52133d6edde0a057c8

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks