General

  • Target

    4f8e715b421a38e6e33e80cb77a98728bc670f08d2afa1e297a52cfff8b54bcc

  • Size

    170KB

  • Sample

    210610-t8nm3wjvn2

  • MD5

    54e206539fa96107dfdef5f160d7400a

  • SHA1

    d686b5223e074ff3988670bb8dff140cdd183ab4

  • SHA256

    4f8e715b421a38e6e33e80cb77a98728bc670f08d2afa1e297a52cfff8b54bcc

  • SHA512

    7ab24cafa07e6956f4dfa98caabca09ebc77604a5ef05b1da1086a1076613950622eb63d112347fb0fe89f2a0cebd2bdfee75e11319e253fd637ecd043995eef

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      4f8e715b421a38e6e33e80cb77a98728bc670f08d2afa1e297a52cfff8b54bcc

    • Size

      170KB

    • MD5

      54e206539fa96107dfdef5f160d7400a

    • SHA1

      d686b5223e074ff3988670bb8dff140cdd183ab4

    • SHA256

      4f8e715b421a38e6e33e80cb77a98728bc670f08d2afa1e297a52cfff8b54bcc

    • SHA512

      7ab24cafa07e6956f4dfa98caabca09ebc77604a5ef05b1da1086a1076613950622eb63d112347fb0fe89f2a0cebd2bdfee75e11319e253fd637ecd043995eef

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks