General

  • Target

    b8fYC3NLNB8

  • Size

    154KB

  • Sample

    210421-vctd5p6x96

  • MD5

    9862677c50132a5fe8825863a13867cd

  • SHA1

    6b068f74cbbc939387d2e6249f7890d4da6fefcc

  • SHA256

    72db60916f8228af537fd6cdb13407c5ba131ec36df50dd11d834860f97846f5

  • SHA512

    6e51cb7f51e42922e78cc2c66031f0755945c2154ad19c24a455b0df7105514b6eb01814b797e46406c800e0a7a9e1710870b88ae39766d54b4fa0f2c855bc25

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      b8fYC3NLNB8

    • Size

      154KB

    • MD5

      9862677c50132a5fe8825863a13867cd

    • SHA1

      6b068f74cbbc939387d2e6249f7890d4da6fefcc

    • SHA256

      72db60916f8228af537fd6cdb13407c5ba131ec36df50dd11d834860f97846f5

    • SHA512

      6e51cb7f51e42922e78cc2c66031f0755945c2154ad19c24a455b0df7105514b6eb01814b797e46406c800e0a7a9e1710870b88ae39766d54b4fa0f2c855bc25

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks