General

  • Target

    c3c453ff0c0ebe811b9ecdf8afd2afc555c0c5fa93c8426939070018681fde3a

  • Size

    170KB

  • Sample

    210610-akpz7pbygn

  • MD5

    a831141c63f9df9e2daee70788813930

  • SHA1

    bef480dd141868983ccfbcbd168452ab60c05997

  • SHA256

    c3c453ff0c0ebe811b9ecdf8afd2afc555c0c5fa93c8426939070018681fde3a

  • SHA512

    1b983e8638a3ece39ec397dfa7ceace5f458822d52a399a6ff1a7b43492b088a0b33cefc65b0781e1b695738d63ae1f101a140fba0c4580561235d411618b030

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      c3c453ff0c0ebe811b9ecdf8afd2afc555c0c5fa93c8426939070018681fde3a

    • Size

      170KB

    • MD5

      a831141c63f9df9e2daee70788813930

    • SHA1

      bef480dd141868983ccfbcbd168452ab60c05997

    • SHA256

      c3c453ff0c0ebe811b9ecdf8afd2afc555c0c5fa93c8426939070018681fde3a

    • SHA512

      1b983e8638a3ece39ec397dfa7ceace5f458822d52a399a6ff1a7b43492b088a0b33cefc65b0781e1b695738d63ae1f101a140fba0c4580561235d411618b030

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks