General

  • Target

    8ee8613f3d1ada749352560e5b189f24a467035fd84f6e6a3732de334d44e568

  • Size

    170KB

  • Sample

    210611-zgvd9b824a

  • MD5

    cf6bf7c46872ce5d6c0dbb4dcbe115a4

  • SHA1

    d82641b4f8cd81f58f1208410c79d89189c29631

  • SHA256

    8ee8613f3d1ada749352560e5b189f24a467035fd84f6e6a3732de334d44e568

  • SHA512

    b7c0c80daead21f53d75c779854f43271e601fdcdb7a25d06962fbdf8773790c7aa51951d21bdad9e249794226e210b5c8e5d17e2a0b32e14960a8d4acdc47c1

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      8ee8613f3d1ada749352560e5b189f24a467035fd84f6e6a3732de334d44e568

    • Size

      170KB

    • MD5

      cf6bf7c46872ce5d6c0dbb4dcbe115a4

    • SHA1

      d82641b4f8cd81f58f1208410c79d89189c29631

    • SHA256

      8ee8613f3d1ada749352560e5b189f24a467035fd84f6e6a3732de334d44e568

    • SHA512

      b7c0c80daead21f53d75c779854f43271e601fdcdb7a25d06962fbdf8773790c7aa51951d21bdad9e249794226e210b5c8e5d17e2a0b32e14960a8d4acdc47c1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks