General

  • Target

    cb2c00556d4a1506b92163e438afa07a140b4a5866bbb1c84de22d75e69bc1ed

  • Size

    157KB

  • Sample

    210421-hr7lyz9tkj

  • MD5

    7334369acd0a942d27acd7bec383b459

  • SHA1

    d22969d0f06136c72037500221e0da2f97f07153

  • SHA256

    cb2c00556d4a1506b92163e438afa07a140b4a5866bbb1c84de22d75e69bc1ed

  • SHA512

    22c296aa87ea1e18bc093c43c5bcf1c359b50adfa300e7a010e09f546ac4d13ef85733b931fd000cdcca71584abdf693ebc64c3b7a43680fa0dd40e0f109eb72

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      cb2c00556d4a1506b92163e438afa07a140b4a5866bbb1c84de22d75e69bc1ed

    • Size

      157KB

    • MD5

      7334369acd0a942d27acd7bec383b459

    • SHA1

      d22969d0f06136c72037500221e0da2f97f07153

    • SHA256

      cb2c00556d4a1506b92163e438afa07a140b4a5866bbb1c84de22d75e69bc1ed

    • SHA512

      22c296aa87ea1e18bc093c43c5bcf1c359b50adfa300e7a010e09f546ac4d13ef85733b931fd000cdcca71584abdf693ebc64c3b7a43680fa0dd40e0f109eb72

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks