General

  • Target

    39a462e876f08aed507327cb29f455523dd4dd8e9a115fe506482438904cf557

  • Size

    158KB

  • Sample

    210619-vnjcxs15sj

  • MD5

    504de444d0a0209fa748179a50a6c63e

  • SHA1

    2fc259f7e444a0420ed050bb87e90e1d7f7ef8c5

  • SHA256

    39a462e876f08aed507327cb29f455523dd4dd8e9a115fe506482438904cf557

  • SHA512

    73c79d4eeac1ce7078b5cc52712e1e31795853381e022f51b9e9455741f31497456e1c29876e3b22f53a63348dab0f51a4de56a68eb5890d63e4e7f52bb3bb96

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      39a462e876f08aed507327cb29f455523dd4dd8e9a115fe506482438904cf557

    • Size

      158KB

    • MD5

      504de444d0a0209fa748179a50a6c63e

    • SHA1

      2fc259f7e444a0420ed050bb87e90e1d7f7ef8c5

    • SHA256

      39a462e876f08aed507327cb29f455523dd4dd8e9a115fe506482438904cf557

    • SHA512

      73c79d4eeac1ce7078b5cc52712e1e31795853381e022f51b9e9455741f31497456e1c29876e3b22f53a63348dab0f51a4de56a68eb5890d63e4e7f52bb3bb96

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks