General

  • Target

    c8232e0096f30c5a0f81133be1b90761395de4d21dd8d1626bb9181c82f811d7

  • Size

    639KB

  • Sample

    210419-spcsthcb16

  • MD5

    0e4ae2e789c8ad41e1d77de7afe3c5c3

  • SHA1

    f01a3c9681fb27d4d1582ee65a174e1b7898593b

  • SHA256

    c8232e0096f30c5a0f81133be1b90761395de4d21dd8d1626bb9181c82f811d7

  • SHA512

    a3a7766d4d4f7fb268d20799701171d969fd219d264eb64dbee50744d1716e751e224c32e10b40ce23d5c8e2d728c4c094413f7341ca928ea657f33bac9a45a5

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

146.185.170.249:443

62.75.251.60:6601

185.148.168.25:2303

rc4.plain
rc4.plain

Targets

    • Target

      c8232e0096f30c5a0f81133be1b90761395de4d21dd8d1626bb9181c82f811d7

    • Size

      639KB

    • MD5

      0e4ae2e789c8ad41e1d77de7afe3c5c3

    • SHA1

      f01a3c9681fb27d4d1582ee65a174e1b7898593b

    • SHA256

      c8232e0096f30c5a0f81133be1b90761395de4d21dd8d1626bb9181c82f811d7

    • SHA512

      a3a7766d4d4f7fb268d20799701171d969fd219d264eb64dbee50744d1716e751e224c32e10b40ce23d5c8e2d728c4c094413f7341ca928ea657f33bac9a45a5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks