General

  • Target

    5e24334b6a073118fcb07a1ae888496a95c997ff026af04ec121a1aab2b6435d

  • Size

    162KB

  • Sample

    210620-krpy78s5m6

  • MD5

    f7ed61fa60db0cce1f737f335faaa66b

  • SHA1

    799dc8a0d6caeed5428ed9933dd9c7dfd0910644

  • SHA256

    5e24334b6a073118fcb07a1ae888496a95c997ff026af04ec121a1aab2b6435d

  • SHA512

    d452b95818d830907860d395ef7e5ed156c13cd580e14b89aff536116f041a376607758173d9da199d6252b1d107421ac2d052dfed51754b70df2f04185a83ed

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      5e24334b6a073118fcb07a1ae888496a95c997ff026af04ec121a1aab2b6435d

    • Size

      162KB

    • MD5

      f7ed61fa60db0cce1f737f335faaa66b

    • SHA1

      799dc8a0d6caeed5428ed9933dd9c7dfd0910644

    • SHA256

      5e24334b6a073118fcb07a1ae888496a95c997ff026af04ec121a1aab2b6435d

    • SHA512

      d452b95818d830907860d395ef7e5ed156c13cd580e14b89aff536116f041a376607758173d9da199d6252b1d107421ac2d052dfed51754b70df2f04185a83ed

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks