General

  • Target

    29deac0b_by_Libranalysis

  • Size

    158KB

  • Sample

    210511-7ks439nq8s

  • MD5

    29deac0b4ec54e43e428f9bfb2af3a17

  • SHA1

    d0e4ba078ce233adf81fc1032a565db6437a7d4a

  • SHA256

    be7a589590cc619fd8284e944fe4bf0ef02d9890b22a85ea6a0e1052b6f5b2c4

  • SHA512

    8be8ed168c45f72a945bf44d51f03769e178b9fda0848ab1976609621061d3e706c7cae885ff491cf5fa5a3fa6250b1aef00471fddaf64b98e91a595ae4da8b9

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      29deac0b_by_Libranalysis

    • Size

      158KB

    • MD5

      29deac0b4ec54e43e428f9bfb2af3a17

    • SHA1

      d0e4ba078ce233adf81fc1032a565db6437a7d4a

    • SHA256

      be7a589590cc619fd8284e944fe4bf0ef02d9890b22a85ea6a0e1052b6f5b2c4

    • SHA512

      8be8ed168c45f72a945bf44d51f03769e178b9fda0848ab1976609621061d3e706c7cae885ff491cf5fa5a3fa6250b1aef00471fddaf64b98e91a595ae4da8b9

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks