General

  • Target

    e793ff6113f0189b82bddab52eed1cab812f834a017a4f11de1d7f72961d3c0b

  • Size

    157KB

  • Sample

    210421-z5vdm66h36

  • MD5

    799b91067700be7bbe11346804320d93

  • SHA1

    8ab571ef19d0f3ff6fd428152766f5abf9e43def

  • SHA256

    e793ff6113f0189b82bddab52eed1cab812f834a017a4f11de1d7f72961d3c0b

  • SHA512

    5a47a30398e3c49f81b468a4fee5aa7e3dcc0e20bd2be0510655660d5527d783a351ef03ac971afd866e9935f124ba39938de82330bae65276227afdda9cc6cd

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      e793ff6113f0189b82bddab52eed1cab812f834a017a4f11de1d7f72961d3c0b

    • Size

      157KB

    • MD5

      799b91067700be7bbe11346804320d93

    • SHA1

      8ab571ef19d0f3ff6fd428152766f5abf9e43def

    • SHA256

      e793ff6113f0189b82bddab52eed1cab812f834a017a4f11de1d7f72961d3c0b

    • SHA512

      5a47a30398e3c49f81b468a4fee5aa7e3dcc0e20bd2be0510655660d5527d783a351ef03ac971afd866e9935f124ba39938de82330bae65276227afdda9cc6cd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks