General

  • Target

    9765f349cdd3038e991f5a0034afdca2c54981290ca71f765ebb32fb707bb232

  • Size

    162KB

  • Sample

    210610-awhb8ry1yn

  • MD5

    5f54e5f8d0328588b48f389147f5bcaf

  • SHA1

    080ddb92d6066a7fa09d4b53bd256db1787d2dd6

  • SHA256

    9765f349cdd3038e991f5a0034afdca2c54981290ca71f765ebb32fb707bb232

  • SHA512

    da79c75f9af77160f9b79638e867adb5afa21c2336a21173c48e4c0f5277448f5065951f81f9d92da995b0d3200777f0158708dc7e75633d0fc84423674c4897

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      9765f349cdd3038e991f5a0034afdca2c54981290ca71f765ebb32fb707bb232

    • Size

      162KB

    • MD5

      5f54e5f8d0328588b48f389147f5bcaf

    • SHA1

      080ddb92d6066a7fa09d4b53bd256db1787d2dd6

    • SHA256

      9765f349cdd3038e991f5a0034afdca2c54981290ca71f765ebb32fb707bb232

    • SHA512

      da79c75f9af77160f9b79638e867adb5afa21c2336a21173c48e4c0f5277448f5065951f81f9d92da995b0d3200777f0158708dc7e75633d0fc84423674c4897

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks