General

  • Target

    setups.exe

  • Size

    2.0MB

  • Sample

    210410-f88s56xzq6

  • MD5

    2f6511abc3a54d2ecadc0970805a0ad6

  • SHA1

    a2b304428f02d9f4b23c24cc7fe80f319a51f204

  • SHA256

    be315dc46922d27c67a50ebadaa0d47425f89108c5657841aaee35ae5375ec7e

  • SHA512

    81165db7fd648f1944b3365722baff3884bebb8328c901a8e3e80c318ebba4c88c092df3982eaf013b3757047442a8fed93048222c5a757d45185bd93c835638

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

131.100.24.231:443

188.165.17.91:8443

185.148.169.10:2303

rc4.plain
rc4.plain

Targets

    • Target

      setups.exe

    • Size

      2.0MB

    • MD5

      2f6511abc3a54d2ecadc0970805a0ad6

    • SHA1

      a2b304428f02d9f4b23c24cc7fe80f319a51f204

    • SHA256

      be315dc46922d27c67a50ebadaa0d47425f89108c5657841aaee35ae5375ec7e

    • SHA512

      81165db7fd648f1944b3365722baff3884bebb8328c901a8e3e80c318ebba4c88c092df3982eaf013b3757047442a8fed93048222c5a757d45185bd93c835638

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks