General

  • Target

    ea2f941ffc23be4030b9c50c96881fac1c14f0a4296387980775ced2f42712be

  • Size

    157KB

  • Sample

    210421-h3nf3fp3v6

  • MD5

    86a6be25f4921d550a34b47e29ad5710

  • SHA1

    2dda54e13132f2f6fa69407e2d9edac78a82660f

  • SHA256

    ea2f941ffc23be4030b9c50c96881fac1c14f0a4296387980775ced2f42712be

  • SHA512

    95a72f1496dd9b70086169a26a5ac200235bb826778db626d9f65881a41ae9c771808d8c315d80de9050a1d6d8ae6e0bc5753b0290cabcb3caf9484420222804

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      ea2f941ffc23be4030b9c50c96881fac1c14f0a4296387980775ced2f42712be

    • Size

      157KB

    • MD5

      86a6be25f4921d550a34b47e29ad5710

    • SHA1

      2dda54e13132f2f6fa69407e2d9edac78a82660f

    • SHA256

      ea2f941ffc23be4030b9c50c96881fac1c14f0a4296387980775ced2f42712be

    • SHA512

      95a72f1496dd9b70086169a26a5ac200235bb826778db626d9f65881a41ae9c771808d8c315d80de9050a1d6d8ae6e0bc5753b0290cabcb3caf9484420222804

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks