General

  • Target

    759dede3369c7b130d9c52b2d2718ea4bf86b12e104508b5f7b12b7a7c93715a

  • Size

    158KB

  • Sample

    210621-mk1xa8m3t2

  • MD5

    e9f02ab0f8859f36df2dccab7b1e0d26

  • SHA1

    599e3431aeee3e7942d81cd540319491ea0b425d

  • SHA256

    759dede3369c7b130d9c52b2d2718ea4bf86b12e104508b5f7b12b7a7c93715a

  • SHA512

    d3f6b8295f28796e6b866c47b6b3a7a1b604365f611c2a8567d3b6743b247459ced6895d50a380af55a5b72b1252e5853ea7e06a3be6241118db0ddedbc54bf4

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      759dede3369c7b130d9c52b2d2718ea4bf86b12e104508b5f7b12b7a7c93715a

    • Size

      158KB

    • MD5

      e9f02ab0f8859f36df2dccab7b1e0d26

    • SHA1

      599e3431aeee3e7942d81cd540319491ea0b425d

    • SHA256

      759dede3369c7b130d9c52b2d2718ea4bf86b12e104508b5f7b12b7a7c93715a

    • SHA512

      d3f6b8295f28796e6b866c47b6b3a7a1b604365f611c2a8567d3b6743b247459ced6895d50a380af55a5b72b1252e5853ea7e06a3be6241118db0ddedbc54bf4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks