General

  • Target

    c8de12ff4039f6b8e29b787335d0d0bcce9778f129551eb8cf489b809815e08a

  • Size

    170KB

  • Sample

    210611-qeyenwdbwn

  • MD5

    8955b4fb082a3e3a0abb982244b754eb

  • SHA1

    c08e1c1f8a895352ebc292ba8ba8c929157fdbe5

  • SHA256

    c8de12ff4039f6b8e29b787335d0d0bcce9778f129551eb8cf489b809815e08a

  • SHA512

    b09d4fd0c571e17962539f0f26d3ea518d1005217599b912620b1859844a2f8436319edc0b65c278bc4fc749ace46891ff673cc9162d459768baeac7553d01f7

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      c8de12ff4039f6b8e29b787335d0d0bcce9778f129551eb8cf489b809815e08a

    • Size

      170KB

    • MD5

      8955b4fb082a3e3a0abb982244b754eb

    • SHA1

      c08e1c1f8a895352ebc292ba8ba8c929157fdbe5

    • SHA256

      c8de12ff4039f6b8e29b787335d0d0bcce9778f129551eb8cf489b809815e08a

    • SHA512

      b09d4fd0c571e17962539f0f26d3ea518d1005217599b912620b1859844a2f8436319edc0b65c278bc4fc749ace46891ff673cc9162d459768baeac7553d01f7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks