General

  • Target

    3d835529c2436b903f6b14c640f3eae74eedcfe8e7a51641a9184fce4e470a0c

  • Size

    196KB

  • Sample

    210304-3cnjqpzwya

  • MD5

    a20ebf180e8ba3d3901f7348899ea2bc

  • SHA1

    412782d6fe2c87e48a0712031c2915066ab03b3d

  • SHA256

    3d835529c2436b903f6b14c640f3eae74eedcfe8e7a51641a9184fce4e470a0c

  • SHA512

    d9d13cd077b27ed53113509f3b555ad40e9f1b6eae0d014c58e515aa645aaba99e28ee96b884aee66333918c353da1e0e05d0f1b6f4485bd2f3f1e7c4d09c6d4

Malware Config

Extracted

Family

dridex

Botnet

111

C2

37.247.35.132:443

50.243.30.51:6601

162.241.204.234:6516

rc4.plain
rc4.plain

Targets

    • Target

      3d835529c2436b903f6b14c640f3eae74eedcfe8e7a51641a9184fce4e470a0c

    • Size

      196KB

    • MD5

      a20ebf180e8ba3d3901f7348899ea2bc

    • SHA1

      412782d6fe2c87e48a0712031c2915066ab03b3d

    • SHA256

      3d835529c2436b903f6b14c640f3eae74eedcfe8e7a51641a9184fce4e470a0c

    • SHA512

      d9d13cd077b27ed53113509f3b555ad40e9f1b6eae0d014c58e515aa645aaba99e28ee96b884aee66333918c353da1e0e05d0f1b6f4485bd2f3f1e7c4d09c6d4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks