General

  • Target

    ed66ef1202ee081fa63913b3e86f9415f490859dcab71d7c164f5173e5b10e62

  • Size

    158KB

  • Sample

    210421-kdqyjm6tzs

  • MD5

    ede7c6855776606a965bad359e3175ba

  • SHA1

    d5c2317d5021198409eb7c627c4c1089592b3ecd

  • SHA256

    ed66ef1202ee081fa63913b3e86f9415f490859dcab71d7c164f5173e5b10e62

  • SHA512

    47f29d6eeb07aa2ceae72e8d7ff2fc83893daf56cdfe9c61605ecef8e32a068731682c3113c4c601fccbebf2492977b61742361610f6cab877a022c112b78fad

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      ed66ef1202ee081fa63913b3e86f9415f490859dcab71d7c164f5173e5b10e62

    • Size

      158KB

    • MD5

      ede7c6855776606a965bad359e3175ba

    • SHA1

      d5c2317d5021198409eb7c627c4c1089592b3ecd

    • SHA256

      ed66ef1202ee081fa63913b3e86f9415f490859dcab71d7c164f5173e5b10e62

    • SHA512

      47f29d6eeb07aa2ceae72e8d7ff2fc83893daf56cdfe9c61605ecef8e32a068731682c3113c4c601fccbebf2492977b61742361610f6cab877a022c112b78fad

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks