General

  • Target

    ca4c37153d439738af3183275ee0b289bd210a3b0da45e37436a55b0457cd7c1

  • Size

    785KB

  • Sample

    210405-fqeb7k8kjx

  • MD5

    6d30b0883ffaed58046a131139b0ab0d

  • SHA1

    f594c4089d77661a029e5e3120a0b22fa6099be4

  • SHA256

    ca4c37153d439738af3183275ee0b289bd210a3b0da45e37436a55b0457cd7c1

  • SHA512

    8aea63cd51424dbaa0b2ffb7bccbe2ebd8b128e5c6e0e9be115e47cd4d7bee4314bcb96c6c86e37dbbf434068461e560449a67466060370255804ce00e9832d2

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

209.20.87.138:443

198.1.115.153:8172

151.236.29.248:6516

rc4.plain
rc4.plain

Targets

    • Target

      ca4c37153d439738af3183275ee0b289bd210a3b0da45e37436a55b0457cd7c1

    • Size

      785KB

    • MD5

      6d30b0883ffaed58046a131139b0ab0d

    • SHA1

      f594c4089d77661a029e5e3120a0b22fa6099be4

    • SHA256

      ca4c37153d439738af3183275ee0b289bd210a3b0da45e37436a55b0457cd7c1

    • SHA512

      8aea63cd51424dbaa0b2ffb7bccbe2ebd8b128e5c6e0e9be115e47cd4d7bee4314bcb96c6c86e37dbbf434068461e560449a67466060370255804ce00e9832d2

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks