General

  • Target

    0e46862bc60a47ee9a0844ab9d56cad65ec0a8b60a2908a9e92ca1297236c38b

  • Size

    158KB

  • Sample

    210620-lya55zlzh2

  • MD5

    ea1b282eb845fd86faa807e1858a9f9a

  • SHA1

    cb9fa02410e6b6a9b42f517c7c5d2360928186be

  • SHA256

    0e46862bc60a47ee9a0844ab9d56cad65ec0a8b60a2908a9e92ca1297236c38b

  • SHA512

    c3f55c28b0518343bc5d1ec647fe73f224c6c4693795895af025848d2849fcd6811cf13c189ea5cb86a504d863c3000c0493f290781dffcdb9552e082667e450

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      0e46862bc60a47ee9a0844ab9d56cad65ec0a8b60a2908a9e92ca1297236c38b

    • Size

      158KB

    • MD5

      ea1b282eb845fd86faa807e1858a9f9a

    • SHA1

      cb9fa02410e6b6a9b42f517c7c5d2360928186be

    • SHA256

      0e46862bc60a47ee9a0844ab9d56cad65ec0a8b60a2908a9e92ca1297236c38b

    • SHA512

      c3f55c28b0518343bc5d1ec647fe73f224c6c4693795895af025848d2849fcd6811cf13c189ea5cb86a504d863c3000c0493f290781dffcdb9552e082667e450

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks