General

  • Target

    63085205530128456214b3333944ff0f882003101bd574e30736d6dde16d7129

  • Size

    154KB

  • Sample

    210421-jpgsgt1hc2

  • MD5

    40eb8664aa812acad85285392f9a4ab7

  • SHA1

    9d3e3652cb8530109a1857cfd59638eebb24c62a

  • SHA256

    63085205530128456214b3333944ff0f882003101bd574e30736d6dde16d7129

  • SHA512

    4e2998fadef8d29b2202fc17bb7fc262f2714de5ae12c884df05caf6704a0cb1b29b7f7fa918ecdb124db0fed1c337f9303db9c088adcd07a3c71bb9c587b6d0

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      63085205530128456214b3333944ff0f882003101bd574e30736d6dde16d7129

    • Size

      154KB

    • MD5

      40eb8664aa812acad85285392f9a4ab7

    • SHA1

      9d3e3652cb8530109a1857cfd59638eebb24c62a

    • SHA256

      63085205530128456214b3333944ff0f882003101bd574e30736d6dde16d7129

    • SHA512

      4e2998fadef8d29b2202fc17bb7fc262f2714de5ae12c884df05caf6704a0cb1b29b7f7fa918ecdb124db0fed1c337f9303db9c088adcd07a3c71bb9c587b6d0

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks