General

  • Target

    5b0abe95078fccdce2a10810ee6035e625c706782309a929135ecb804f10bee1

  • Size

    162KB

  • Sample

    210421-t37aqwpqhe

  • MD5

    648d16b5351e99537074784a52148567

  • SHA1

    e7cf9e1836be7f5a0b16f956d33e12c4d49df79b

  • SHA256

    5b0abe95078fccdce2a10810ee6035e625c706782309a929135ecb804f10bee1

  • SHA512

    e46abeb647c1ac13df4f4cc3674165159860e4f9c4896f9d42ec058d3e300ef187476146495e100e5b88b20f360c05490dbd383ae35ae1cf35ef92c3a6407bd8

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      5b0abe95078fccdce2a10810ee6035e625c706782309a929135ecb804f10bee1

    • Size

      162KB

    • MD5

      648d16b5351e99537074784a52148567

    • SHA1

      e7cf9e1836be7f5a0b16f956d33e12c4d49df79b

    • SHA256

      5b0abe95078fccdce2a10810ee6035e625c706782309a929135ecb804f10bee1

    • SHA512

      e46abeb647c1ac13df4f4cc3674165159860e4f9c4896f9d42ec058d3e300ef187476146495e100e5b88b20f360c05490dbd383ae35ae1cf35ef92c3a6407bd8

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks