General

  • Target

    ae1b0338a96f1cfea9c89375a7f30fbe7c185e909ead28326fb3330593466cbd

  • Size

    154KB

  • Sample

    210421-xx5sb2v1ea

  • MD5

    dee7a47c887210b450ad00fc12b217d8

  • SHA1

    0d887dca544bbad9b72724a17463ac6e2000e2db

  • SHA256

    ae1b0338a96f1cfea9c89375a7f30fbe7c185e909ead28326fb3330593466cbd

  • SHA512

    42bb0dc22754c3ec064963bb557521c267c9d6061dc145ec9c02ef31359e35aeb98dde7f0fe7423e87c5d692c06005cabada631777956ee880b36cc58e89eca3

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      ae1b0338a96f1cfea9c89375a7f30fbe7c185e909ead28326fb3330593466cbd

    • Size

      154KB

    • MD5

      dee7a47c887210b450ad00fc12b217d8

    • SHA1

      0d887dca544bbad9b72724a17463ac6e2000e2db

    • SHA256

      ae1b0338a96f1cfea9c89375a7f30fbe7c185e909ead28326fb3330593466cbd

    • SHA512

      42bb0dc22754c3ec064963bb557521c267c9d6061dc145ec9c02ef31359e35aeb98dde7f0fe7423e87c5d692c06005cabada631777956ee880b36cc58e89eca3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks