General

  • Target

    cc5528a966751eed9752be3fa00fe28fb7de2029c92da142f0ac354301320e35

  • Size

    174KB

  • Sample

    210611-kpjr18drfa

  • MD5

    dfd87654a75ff8421026b52426716e16

  • SHA1

    efa641268649a27bc875208cd02f362850ce9574

  • SHA256

    cc5528a966751eed9752be3fa00fe28fb7de2029c92da142f0ac354301320e35

  • SHA512

    c9f0be6994f03272bea6641e6781a9ea508739214dbdad1580d9cd7c4474d0ee7352be526b5cc71a434886fd20ce0d470f21e8dda3479a6c48699c6bafc9cf5e

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

178.128.220.64:30333

45.79.91.89:9987

rc4.plain
rc4.plain

Targets

    • Target

      cc5528a966751eed9752be3fa00fe28fb7de2029c92da142f0ac354301320e35

    • Size

      174KB

    • MD5

      dfd87654a75ff8421026b52426716e16

    • SHA1

      efa641268649a27bc875208cd02f362850ce9574

    • SHA256

      cc5528a966751eed9752be3fa00fe28fb7de2029c92da142f0ac354301320e35

    • SHA512

      c9f0be6994f03272bea6641e6781a9ea508739214dbdad1580d9cd7c4474d0ee7352be526b5cc71a434886fd20ce0d470f21e8dda3479a6c48699c6bafc9cf5e

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks