General

  • Target

    1e1047718c906bb39c0b2ccd2e06012df05ea5fda76d8e977bba252f57871a36

  • Size

    170KB

  • Sample

    210611-5p1qlgtwv2

  • MD5

    3a403f89fa5d4937d4eb47d6e42670a2

  • SHA1

    17aeb115bf55687144facbc7466b9720519ad34a

  • SHA256

    1e1047718c906bb39c0b2ccd2e06012df05ea5fda76d8e977bba252f57871a36

  • SHA512

    7be514a1518d65175fa3e2091355ea6162a9fa8be267bc305a84acc21050549b9406229777f230e3049cf930699d00e31789e3da60e18cd5d8bf0c082780b676

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      1e1047718c906bb39c0b2ccd2e06012df05ea5fda76d8e977bba252f57871a36

    • Size

      170KB

    • MD5

      3a403f89fa5d4937d4eb47d6e42670a2

    • SHA1

      17aeb115bf55687144facbc7466b9720519ad34a

    • SHA256

      1e1047718c906bb39c0b2ccd2e06012df05ea5fda76d8e977bba252f57871a36

    • SHA512

      7be514a1518d65175fa3e2091355ea6162a9fa8be267bc305a84acc21050549b9406229777f230e3049cf930699d00e31789e3da60e18cd5d8bf0c082780b676

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks