General

  • Target

    20d50b45cc82bd614bc6ba3da79c87c2fe22219ad5920c8e9b91edc561d8f360

  • Size

    170KB

  • Sample

    210610-jwh6exc2px

  • MD5

    48de6355d700e054c51ad6744eb774ad

  • SHA1

    410aa21494b167fdfb155186d9484e44b4c4f4a9

  • SHA256

    20d50b45cc82bd614bc6ba3da79c87c2fe22219ad5920c8e9b91edc561d8f360

  • SHA512

    c5b04ac9ac6f38790d865a6d89bbdc36217ffdfce3ba6ad465a9a19835a42f4e7cfccdc817ff0ff8acc3dcf5497ec0ca1c684818feae548e5f2e6d004d1987fe

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      20d50b45cc82bd614bc6ba3da79c87c2fe22219ad5920c8e9b91edc561d8f360

    • Size

      170KB

    • MD5

      48de6355d700e054c51ad6744eb774ad

    • SHA1

      410aa21494b167fdfb155186d9484e44b4c4f4a9

    • SHA256

      20d50b45cc82bd614bc6ba3da79c87c2fe22219ad5920c8e9b91edc561d8f360

    • SHA512

      c5b04ac9ac6f38790d865a6d89bbdc36217ffdfce3ba6ad465a9a19835a42f4e7cfccdc817ff0ff8acc3dcf5497ec0ca1c684818feae548e5f2e6d004d1987fe

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks