General

  • Target

    e180619fc7554507ad47b4396468f4de05f5eed4774aed3355cc873163925cc1

  • Size

    158KB

  • Sample

    210620-maax2sqt4x

  • MD5

    f312c5bed95779debf7f99f586ceff6c

  • SHA1

    f219194846a4b9495a49294e49739e511e7cf038

  • SHA256

    e180619fc7554507ad47b4396468f4de05f5eed4774aed3355cc873163925cc1

  • SHA512

    6306503ea7ec56d70a1e8feeb8b908cdfb10f556c0b51e3e05e411f166cf84f98d5a878951f5d409e52bc27767c4ddc52ee71854be8a8e9f3e939311a81407be

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      e180619fc7554507ad47b4396468f4de05f5eed4774aed3355cc873163925cc1

    • Size

      158KB

    • MD5

      f312c5bed95779debf7f99f586ceff6c

    • SHA1

      f219194846a4b9495a49294e49739e511e7cf038

    • SHA256

      e180619fc7554507ad47b4396468f4de05f5eed4774aed3355cc873163925cc1

    • SHA512

      6306503ea7ec56d70a1e8feeb8b908cdfb10f556c0b51e3e05e411f166cf84f98d5a878951f5d409e52bc27767c4ddc52ee71854be8a8e9f3e939311a81407be

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks