General

  • Target

    1885ba5cdd126ef02383bbb69c6cac4ee7419ccb4c5e80ef93bab08d60030611

  • Size

    157KB

  • Sample

    210421-577qhgyg52

  • MD5

    e93bd9c761576f3b397cbdec61f50c44

  • SHA1

    543bae3468f72a4c05825f4e7440903be767ac0e

  • SHA256

    1885ba5cdd126ef02383bbb69c6cac4ee7419ccb4c5e80ef93bab08d60030611

  • SHA512

    8d0dd3a6408fa9511c69014e65b44ebc78e889233b0b33ff950d2a1c92c0227dc614997c9824928990397794566c716eef2fe4a400f6575691371a46bd70a8ca

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      1885ba5cdd126ef02383bbb69c6cac4ee7419ccb4c5e80ef93bab08d60030611

    • Size

      157KB

    • MD5

      e93bd9c761576f3b397cbdec61f50c44

    • SHA1

      543bae3468f72a4c05825f4e7440903be767ac0e

    • SHA256

      1885ba5cdd126ef02383bbb69c6cac4ee7419ccb4c5e80ef93bab08d60030611

    • SHA512

      8d0dd3a6408fa9511c69014e65b44ebc78e889233b0b33ff950d2a1c92c0227dc614997c9824928990397794566c716eef2fe4a400f6575691371a46bd70a8ca

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks