General

  • Target

    244ee8c71177960a5ebec6ec24bbdbfc751087e48f2fa8a1013dc2a5248def19

  • Size

    170KB

  • Sample

    210611-8fq27z7ttj

  • MD5

    c15cc43042cfb65c583e3bf186b43c54

  • SHA1

    01b985718e93a76f735fe4b72c0128cb6ce038fa

  • SHA256

    244ee8c71177960a5ebec6ec24bbdbfc751087e48f2fa8a1013dc2a5248def19

  • SHA512

    e4300705ebbcdcf421dfca8e3a67c71c7bc1b4b53fb93014bdeb4a777df8fb0db49df6f609d6aad9889b212b5d878a7abe9de61f92e1b754623fed3971393ae3

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      244ee8c71177960a5ebec6ec24bbdbfc751087e48f2fa8a1013dc2a5248def19

    • Size

      170KB

    • MD5

      c15cc43042cfb65c583e3bf186b43c54

    • SHA1

      01b985718e93a76f735fe4b72c0128cb6ce038fa

    • SHA256

      244ee8c71177960a5ebec6ec24bbdbfc751087e48f2fa8a1013dc2a5248def19

    • SHA512

      e4300705ebbcdcf421dfca8e3a67c71c7bc1b4b53fb93014bdeb4a777df8fb0db49df6f609d6aad9889b212b5d878a7abe9de61f92e1b754623fed3971393ae3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks