General

  • Target

    765a0b4da72ab6434010d966df81d1853a6dcb1327b609319332390856c4ac73 (1)

  • Size

    60KB

  • Sample

    210419-vpmxckta9x

  • MD5

    43f414109ce2d6499a026495da965d4c

  • SHA1

    2e758022671b7e8b2b34d1e0f4b8084a1e824eed

  • SHA256

    765a0b4da72ab6434010d966df81d1853a6dcb1327b609319332390856c4ac73

  • SHA512

    44a554e048308dcb481164bee66e16ce4042b1af9818a48d97b18ff0bf27b49db1a4f21a22054e56f494e70b7bcca6b212f3a96c80398125cea5fd8c1b463a48

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

dridex

Botnet

10444

C2

146.185.170.249:443

62.75.251.60:6601

185.148.168.25:2303

rc4.plain
rc4.plain

Targets

    • Target

      765a0b4da72ab6434010d966df81d1853a6dcb1327b609319332390856c4ac73 (1)

    • Size

      60KB

    • MD5

      43f414109ce2d6499a026495da965d4c

    • SHA1

      2e758022671b7e8b2b34d1e0f4b8084a1e824eed

    • SHA256

      765a0b4da72ab6434010d966df81d1853a6dcb1327b609319332390856c4ac73

    • SHA512

      44a554e048308dcb481164bee66e16ce4042b1af9818a48d97b18ff0bf27b49db1a4f21a22054e56f494e70b7bcca6b212f3a96c80398125cea5fd8c1b463a48

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks