General

  • Target

    e185372305ef5600219aed56262b1872a9c90ba1c5144422d8504f44f33aeb17

  • Size

    157KB

  • Sample

    210421-wm2lpnnnfn

  • MD5

    cb77defbec328e1bd3b242d56f4a05f9

  • SHA1

    8693ff331bc44d376ff1613e259772534574d74a

  • SHA256

    e185372305ef5600219aed56262b1872a9c90ba1c5144422d8504f44f33aeb17

  • SHA512

    c85b0a2162c398c845b57cd5fa39e3650ec190c15022e1395f63608950a0bbb6c87fbd4c166d9368015c72952fc7666a547e7cff0b1a4322eb4cfd911eacdef3

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      e185372305ef5600219aed56262b1872a9c90ba1c5144422d8504f44f33aeb17

    • Size

      157KB

    • MD5

      cb77defbec328e1bd3b242d56f4a05f9

    • SHA1

      8693ff331bc44d376ff1613e259772534574d74a

    • SHA256

      e185372305ef5600219aed56262b1872a9c90ba1c5144422d8504f44f33aeb17

    • SHA512

      c85b0a2162c398c845b57cd5fa39e3650ec190c15022e1395f63608950a0bbb6c87fbd4c166d9368015c72952fc7666a547e7cff0b1a4322eb4cfd911eacdef3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks