General

  • Target

    c950481f941a50ce3874219f38a3230c7685427fbbe919bcb1d178737abfd137

  • Size

    154KB

  • Sample

    210421-cdrvhne4ax

  • MD5

    5a0fe46a9066e54aeb3db2938059af15

  • SHA1

    6076a047c1d3fe3bb56d7515f0942387f80f13e8

  • SHA256

    c950481f941a50ce3874219f38a3230c7685427fbbe919bcb1d178737abfd137

  • SHA512

    80f1f3c6da80b3e02290abc348e3132832d3fc624a65ca3db17eaf58538ea5ccbb0dc084bf1511710df04a6df8a28a554498db0282ab14c54155e4de01cd5e45

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      c950481f941a50ce3874219f38a3230c7685427fbbe919bcb1d178737abfd137

    • Size

      154KB

    • MD5

      5a0fe46a9066e54aeb3db2938059af15

    • SHA1

      6076a047c1d3fe3bb56d7515f0942387f80f13e8

    • SHA256

      c950481f941a50ce3874219f38a3230c7685427fbbe919bcb1d178737abfd137

    • SHA512

      80f1f3c6da80b3e02290abc348e3132832d3fc624a65ca3db17eaf58538ea5ccbb0dc084bf1511710df04a6df8a28a554498db0282ab14c54155e4de01cd5e45

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks