General

  • Target

    e37bd843_by_Libranalysis

  • Size

    162KB

  • Sample

    210511-6yb3l77y2n

  • MD5

    e37bd843fd6157acaa8d143594c6c3e2

  • SHA1

    dd759c07df8e2a395e1f6f8a580217b51cb65fbf

  • SHA256

    1ee607bb332f4725a08f305937b3cb79dcc68298bbcc2d09a5f214dbc2a99fa7

  • SHA512

    364adc5fe22885b61188a428fc1f26617e6090414288d1331afaf85072d2f1dd90c7d8a057b25f84231edf732971db172f4927d8c909247f0b2f663a890921fd

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      e37bd843_by_Libranalysis

    • Size

      162KB

    • MD5

      e37bd843fd6157acaa8d143594c6c3e2

    • SHA1

      dd759c07df8e2a395e1f6f8a580217b51cb65fbf

    • SHA256

      1ee607bb332f4725a08f305937b3cb79dcc68298bbcc2d09a5f214dbc2a99fa7

    • SHA512

      364adc5fe22885b61188a428fc1f26617e6090414288d1331afaf85072d2f1dd90c7d8a057b25f84231edf732971db172f4927d8c909247f0b2f663a890921fd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks