General

  • Target

    942785547073f51fe5ac8399b2cf38392f316b77ce11700cf44343af80cc030e

  • Size

    196KB

  • Sample

    210305-z5aysv5xzn

  • MD5

    102c734060c71cec7b0769f19c47f8b0

  • SHA1

    cb7a39309ece9b27a3a536f06bb9dd8afe208304

  • SHA256

    942785547073f51fe5ac8399b2cf38392f316b77ce11700cf44343af80cc030e

  • SHA512

    94cd929402c4458fe365f474db5a7d6f6c98b66c5bbaed3ecb42c067a0b4acff87d4fe7e21fc06fbe0ff21b08ba2b6b7ac70117685e82d6d78075ae054031615

Malware Config

Extracted

Family

dridex

Botnet

111

C2

37.247.35.132:443

50.243.30.51:6601

162.241.204.234:6516

rc4.plain
rc4.plain

Targets

    • Target

      942785547073f51fe5ac8399b2cf38392f316b77ce11700cf44343af80cc030e

    • Size

      196KB

    • MD5

      102c734060c71cec7b0769f19c47f8b0

    • SHA1

      cb7a39309ece9b27a3a536f06bb9dd8afe208304

    • SHA256

      942785547073f51fe5ac8399b2cf38392f316b77ce11700cf44343af80cc030e

    • SHA512

      94cd929402c4458fe365f474db5a7d6f6c98b66c5bbaed3ecb42c067a0b4acff87d4fe7e21fc06fbe0ff21b08ba2b6b7ac70117685e82d6d78075ae054031615

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks