General

  • Target

    e1719f38bcd393bf9a0e0b9c6a706a033a3cf1ac3133759ecdc1ed93dc5f8e7f

  • Size

    154KB

  • Sample

    210421-2psg9gblaj

  • MD5

    83588b9bc163019834cdb85822986d03

  • SHA1

    5e92c2fab9af5b2e3f2345710c1583a56725a32d

  • SHA256

    e1719f38bcd393bf9a0e0b9c6a706a033a3cf1ac3133759ecdc1ed93dc5f8e7f

  • SHA512

    269ffffc9dc5d296d9dd3f6596cb01e9e03704fb06255fe9735a9974e9f8b61a2e971964ddc1eaeb1055cc1786aeaea655de3bc0499f9d8513f1c1e5ce388f2c

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      e1719f38bcd393bf9a0e0b9c6a706a033a3cf1ac3133759ecdc1ed93dc5f8e7f

    • Size

      154KB

    • MD5

      83588b9bc163019834cdb85822986d03

    • SHA1

      5e92c2fab9af5b2e3f2345710c1583a56725a32d

    • SHA256

      e1719f38bcd393bf9a0e0b9c6a706a033a3cf1ac3133759ecdc1ed93dc5f8e7f

    • SHA512

      269ffffc9dc5d296d9dd3f6596cb01e9e03704fb06255fe9735a9974e9f8b61a2e971964ddc1eaeb1055cc1786aeaea655de3bc0499f9d8513f1c1e5ce388f2c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks