General

  • Target

    41bddc2ffa60f135c8aff6354bb5f8a0ea66950f25476209af146b9b1366e420

  • Size

    162KB

  • Sample

    210610-89fhjkl5kj

  • MD5

    e34c25efbd1539e45cce0847eff3550b

  • SHA1

    2fcb581ee670cbdb3ba4993d02360d95b63917b4

  • SHA256

    41bddc2ffa60f135c8aff6354bb5f8a0ea66950f25476209af146b9b1366e420

  • SHA512

    7053dd20d08e90dce72990f677a467935756487f6066f535a265b1056900761436071260b62c55c1393ca2324592f2f394f71b79f222e72f95abb80b29e12b4d

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      41bddc2ffa60f135c8aff6354bb5f8a0ea66950f25476209af146b9b1366e420

    • Size

      162KB

    • MD5

      e34c25efbd1539e45cce0847eff3550b

    • SHA1

      2fcb581ee670cbdb3ba4993d02360d95b63917b4

    • SHA256

      41bddc2ffa60f135c8aff6354bb5f8a0ea66950f25476209af146b9b1366e420

    • SHA512

      7053dd20d08e90dce72990f677a467935756487f6066f535a265b1056900761436071260b62c55c1393ca2324592f2f394f71b79f222e72f95abb80b29e12b4d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks