General

  • Target

    cf0da388491ed7198da2e09a5cd1a0bd78bba56cdb004f9b45e13142be434872

  • Size

    158KB

  • Sample

    210619-h31j77p3rx

  • MD5

    5f7c1e0af25c38437e958a0feb488a29

  • SHA1

    73f1704f96a9dea06363837894d476a54b8b6c8f

  • SHA256

    cf0da388491ed7198da2e09a5cd1a0bd78bba56cdb004f9b45e13142be434872

  • SHA512

    374859d8ba5f7194d80c562bdba8281c7b07abb5bb34172f5725f353038fac5eee05f2891981173a87db2fb790947d8115c3022a0ede90052972f9b549b8742e

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      cf0da388491ed7198da2e09a5cd1a0bd78bba56cdb004f9b45e13142be434872

    • Size

      158KB

    • MD5

      5f7c1e0af25c38437e958a0feb488a29

    • SHA1

      73f1704f96a9dea06363837894d476a54b8b6c8f

    • SHA256

      cf0da388491ed7198da2e09a5cd1a0bd78bba56cdb004f9b45e13142be434872

    • SHA512

      374859d8ba5f7194d80c562bdba8281c7b07abb5bb34172f5725f353038fac5eee05f2891981173a87db2fb790947d8115c3022a0ede90052972f9b549b8742e

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks