General

  • Target

    fa8d0f4ed31cb8bae23ef45563a3ef657f5c6b369e54ac3f7ff5d0661bfdb3c9

  • Size

    162KB

  • Sample

    210610-qxxgze8ams

  • MD5

    6b5d99f7d405c48dcf40136f3886e497

  • SHA1

    09417c6445254aebd85a3f5ca29cf97caa733ab2

  • SHA256

    fa8d0f4ed31cb8bae23ef45563a3ef657f5c6b369e54ac3f7ff5d0661bfdb3c9

  • SHA512

    f26ffafd5a65c55e0d7f5b3ce74963d440911fae1d7cca80bc1867cf1b443f3fbdacfc570c7a259d8a93c3de846d6ca00f8aee4b821c50337a80befecc6152c4

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      fa8d0f4ed31cb8bae23ef45563a3ef657f5c6b369e54ac3f7ff5d0661bfdb3c9

    • Size

      162KB

    • MD5

      6b5d99f7d405c48dcf40136f3886e497

    • SHA1

      09417c6445254aebd85a3f5ca29cf97caa733ab2

    • SHA256

      fa8d0f4ed31cb8bae23ef45563a3ef657f5c6b369e54ac3f7ff5d0661bfdb3c9

    • SHA512

      f26ffafd5a65c55e0d7f5b3ce74963d440911fae1d7cca80bc1867cf1b443f3fbdacfc570c7a259d8a93c3de846d6ca00f8aee4b821c50337a80befecc6152c4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks