General

  • Target

    a868f622_by_Libranalysis

  • Size

    162KB

  • Sample

    210511-1y2rcthsm2

  • MD5

    a868f6223efd4ea597f96eeb62f8b2ef

  • SHA1

    5c11c48231aacab5fa132ef971c77400adba25fa

  • SHA256

    bfa34049fa0089c12fc1907e7c914aa971ab2ac6e11819c537ff7c9223369c26

  • SHA512

    b35621c8a5672ff3c914a1a39f55085b88e81c32c278e4821fd6449d29bcd4989ec8737e11f1b17853c938ddd9ce90233c5c3d595772fde306557f17ecc70ab5

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      a868f622_by_Libranalysis

    • Size

      162KB

    • MD5

      a868f6223efd4ea597f96eeb62f8b2ef

    • SHA1

      5c11c48231aacab5fa132ef971c77400adba25fa

    • SHA256

      bfa34049fa0089c12fc1907e7c914aa971ab2ac6e11819c537ff7c9223369c26

    • SHA512

      b35621c8a5672ff3c914a1a39f55085b88e81c32c278e4821fd6449d29bcd4989ec8737e11f1b17853c938ddd9ce90233c5c3d595772fde306557f17ecc70ab5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks