General

  • Target

    1418ab21363023f3a81a27b7653a9fc649daffc1227ed3598ec75908f5a5406b

  • Size

    154KB

  • Sample

    210421-lelbwebya6

  • MD5

    58dee40bf425f52ff190d180c9d90882

  • SHA1

    68abec2d309ded44c929545138dea1d9bfecaa10

  • SHA256

    1418ab21363023f3a81a27b7653a9fc649daffc1227ed3598ec75908f5a5406b

  • SHA512

    e6f083624cb78d4208cc2c46ce12be5a0a3a459da086bfcc30de4a67cf5b638c82789d6e07540937aaa12842be1363fc9558c91d8c2caf419dde994fc0060055

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      1418ab21363023f3a81a27b7653a9fc649daffc1227ed3598ec75908f5a5406b

    • Size

      154KB

    • MD5

      58dee40bf425f52ff190d180c9d90882

    • SHA1

      68abec2d309ded44c929545138dea1d9bfecaa10

    • SHA256

      1418ab21363023f3a81a27b7653a9fc649daffc1227ed3598ec75908f5a5406b

    • SHA512

      e6f083624cb78d4208cc2c46ce12be5a0a3a459da086bfcc30de4a67cf5b638c82789d6e07540937aaa12842be1363fc9558c91d8c2caf419dde994fc0060055

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks