General

  • Target

    2a0d45e91b3a0d257d2d5fb4dae97a71c22c9954034a1e58cf99482462f703b8

  • Size

    158KB

  • Sample

    210620-ax8bkqq1ee

  • MD5

    b2b8ad222b16e9c5462cf37922ac661e

  • SHA1

    44da9b4c2cde566a3780ff7148f4c1720ed0e583

  • SHA256

    2a0d45e91b3a0d257d2d5fb4dae97a71c22c9954034a1e58cf99482462f703b8

  • SHA512

    bac326fdb4c2eafefe043f104d40b43c8145b8bd70f63fa047c48a73432354fa226952cbca4e98166f74ccfc2d095a10bdac1c52c2e3feb56d8a96ea12fd9449

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      2a0d45e91b3a0d257d2d5fb4dae97a71c22c9954034a1e58cf99482462f703b8

    • Size

      158KB

    • MD5

      b2b8ad222b16e9c5462cf37922ac661e

    • SHA1

      44da9b4c2cde566a3780ff7148f4c1720ed0e583

    • SHA256

      2a0d45e91b3a0d257d2d5fb4dae97a71c22c9954034a1e58cf99482462f703b8

    • SHA512

      bac326fdb4c2eafefe043f104d40b43c8145b8bd70f63fa047c48a73432354fa226952cbca4e98166f74ccfc2d095a10bdac1c52c2e3feb56d8a96ea12fd9449

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks