General

  • Target

    68f1b890375bbc84860789bbf7bad45c887c15661be688885a6375784f57a54d

  • Size

    157KB

  • Sample

    210421-v7ks8vvqwj

  • MD5

    f94bcf412c9b7c78981eb3eabb7a706c

  • SHA1

    64c8b0d56466306fddc338d7cd3865c7af8debeb

  • SHA256

    68f1b890375bbc84860789bbf7bad45c887c15661be688885a6375784f57a54d

  • SHA512

    606e6690f5fd7b93a5a7e226e42148ec508337146f71f4a9d68d3946375a152aea41e7a8df2d3ace27d88ebb1690ec2026f14900996deba6381df3ac05c1aaf9

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      68f1b890375bbc84860789bbf7bad45c887c15661be688885a6375784f57a54d

    • Size

      157KB

    • MD5

      f94bcf412c9b7c78981eb3eabb7a706c

    • SHA1

      64c8b0d56466306fddc338d7cd3865c7af8debeb

    • SHA256

      68f1b890375bbc84860789bbf7bad45c887c15661be688885a6375784f57a54d

    • SHA512

      606e6690f5fd7b93a5a7e226e42148ec508337146f71f4a9d68d3946375a152aea41e7a8df2d3ace27d88ebb1690ec2026f14900996deba6381df3ac05c1aaf9

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks