General

  • Target

    fa54a3dd3130decdb3500c4a954212294013eaad6fef272962969bd79b026150

  • Size

    162KB

  • Sample

    210421-njj3394na2

  • MD5

    8e68dc3363ccb0130183c2fa601924c1

  • SHA1

    a5af80fdf359ea019886435e7e8df8f1fe8291cf

  • SHA256

    fa54a3dd3130decdb3500c4a954212294013eaad6fef272962969bd79b026150

  • SHA512

    b183da0cb9d5b90f6dd10cb71205f4d517320199619a49e1a73a9e690263c6ec3c00362c8595b0434255a6051a2eba62af867b27ee41b84f0486917f3273009c

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      fa54a3dd3130decdb3500c4a954212294013eaad6fef272962969bd79b026150

    • Size

      162KB

    • MD5

      8e68dc3363ccb0130183c2fa601924c1

    • SHA1

      a5af80fdf359ea019886435e7e8df8f1fe8291cf

    • SHA256

      fa54a3dd3130decdb3500c4a954212294013eaad6fef272962969bd79b026150

    • SHA512

      b183da0cb9d5b90f6dd10cb71205f4d517320199619a49e1a73a9e690263c6ec3c00362c8595b0434255a6051a2eba62af867b27ee41b84f0486917f3273009c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks