General

  • Target

    e2df3238e84ece665517352601638e179cb850de6356e036ee9774b461a44a25

  • Size

    172KB

  • Sample

    210615-qlhw2eezxa

  • MD5

    b35727912511c5772121446ab47557f4

  • SHA1

    a3dc20887baee8d16f74df387eb802ac99dd7e2b

  • SHA256

    e2df3238e84ece665517352601638e179cb850de6356e036ee9774b461a44a25

  • SHA512

    b61622837abbf08cdd41a8614b08792f260619d9989d2bfa413ee144b137898f1ffac56d224cbdbfcd8195ec021b9a62603777690ab88e98f9f6451808e0c8ff

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      e2df3238e84ece665517352601638e179cb850de6356e036ee9774b461a44a25

    • Size

      172KB

    • MD5

      b35727912511c5772121446ab47557f4

    • SHA1

      a3dc20887baee8d16f74df387eb802ac99dd7e2b

    • SHA256

      e2df3238e84ece665517352601638e179cb850de6356e036ee9774b461a44a25

    • SHA512

      b61622837abbf08cdd41a8614b08792f260619d9989d2bfa413ee144b137898f1ffac56d224cbdbfcd8195ec021b9a62603777690ab88e98f9f6451808e0c8ff

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks