General

  • Target

    20243d44dc3f30c3acbb48719cce338f57dfcca691fee0c8b08a0ba1104edbbd

  • Size

    188KB

  • Sample

    210303-pglysff3l6

  • MD5

    f28154a02316826468f774bf710e9682

  • SHA1

    677c3371a22c21bbe7c0c993dc9fcb6124618d95

  • SHA256

    20243d44dc3f30c3acbb48719cce338f57dfcca691fee0c8b08a0ba1104edbbd

  • SHA512

    be95b889619cf32fa6cafa2ba48ad588e8f9c05200b7c6b7a07e76c750ce174e50217ba204fe8ac606650c68b7a1ae2295ec256cd4f1cb315f9a05ad08c31ca0

Malware Config

Extracted

Family

dridex

Botnet

111

C2

116.251.211.158:443

216.10.242.142:6601

37.247.35.137:6601

rc4.plain
rc4.plain

Targets

    • Target

      20243d44dc3f30c3acbb48719cce338f57dfcca691fee0c8b08a0ba1104edbbd

    • Size

      188KB

    • MD5

      f28154a02316826468f774bf710e9682

    • SHA1

      677c3371a22c21bbe7c0c993dc9fcb6124618d95

    • SHA256

      20243d44dc3f30c3acbb48719cce338f57dfcca691fee0c8b08a0ba1104edbbd

    • SHA512

      be95b889619cf32fa6cafa2ba48ad588e8f9c05200b7c6b7a07e76c750ce174e50217ba204fe8ac606650c68b7a1ae2295ec256cd4f1cb315f9a05ad08c31ca0

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks