General

  • Target

    6e04ef818dccc2e15c7e7d5f660cc3d96851d24fd8d7780c17b80886b7f2c990

  • Size

    170KB

  • Sample

    210610-96yswqt6ex

  • MD5

    3df4633147b8289bc5f798ba595d526a

  • SHA1

    8e8e74b2dd87e783f9e396eeffe8e4af0a7d741d

  • SHA256

    6e04ef818dccc2e15c7e7d5f660cc3d96851d24fd8d7780c17b80886b7f2c990

  • SHA512

    79d34307fae91428e56d9c6ad5b9738ff1b40d5e21c1d7760bf91569b9463edb73892faabea9687341c7e157d469aa22ea4ba6a5fc212474f6545c4d10528d45

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      6e04ef818dccc2e15c7e7d5f660cc3d96851d24fd8d7780c17b80886b7f2c990

    • Size

      170KB

    • MD5

      3df4633147b8289bc5f798ba595d526a

    • SHA1

      8e8e74b2dd87e783f9e396eeffe8e4af0a7d741d

    • SHA256

      6e04ef818dccc2e15c7e7d5f660cc3d96851d24fd8d7780c17b80886b7f2c990

    • SHA512

      79d34307fae91428e56d9c6ad5b9738ff1b40d5e21c1d7760bf91569b9463edb73892faabea9687341c7e157d469aa22ea4ba6a5fc212474f6545c4d10528d45

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks