General

  • Target

    8e2ecfdf6802a22ef4a346a78ece663397753b31c600db7e0555802421b38067

  • Size

    196KB

  • Sample

    210403-rhmawff3bx

  • MD5

    62ef67a989a2fcd3a44a03a56f247d7c

  • SHA1

    24cf41ef8b71f9cd8d9f2367b997ac2322a4e544

  • SHA256

    8e2ecfdf6802a22ef4a346a78ece663397753b31c600db7e0555802421b38067

  • SHA512

    5e84f91c9118c3236256b6171280afa335f38722b7b4736befc755351bc594af630de9a2a1496b30e35ef9f78e4a66b52100ecaf1c199d2a8d1d3a67447c4a76

Malware Config

Extracted

Family

dridex

Botnet

111

C2

37.247.35.132:443

50.243.30.51:6601

162.241.204.234:6516

rc4.plain
rc4.plain

Targets

    • Target

      8e2ecfdf6802a22ef4a346a78ece663397753b31c600db7e0555802421b38067

    • Size

      196KB

    • MD5

      62ef67a989a2fcd3a44a03a56f247d7c

    • SHA1

      24cf41ef8b71f9cd8d9f2367b997ac2322a4e544

    • SHA256

      8e2ecfdf6802a22ef4a346a78ece663397753b31c600db7e0555802421b38067

    • SHA512

      5e84f91c9118c3236256b6171280afa335f38722b7b4736befc755351bc594af630de9a2a1496b30e35ef9f78e4a66b52100ecaf1c199d2a8d1d3a67447c4a76

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks