General

  • Target

    1a5249545d6842d404c718134bc225099013afdb6f8a932ecfc810e7eb170dbf

  • Size

    158KB

  • Sample

    210621-nr59ww4awj

  • MD5

    d1cffe4c102caf0843f8f25013fbe2f4

  • SHA1

    b4b099a35624e98e66fbd18f90cff0694b32433d

  • SHA256

    1a5249545d6842d404c718134bc225099013afdb6f8a932ecfc810e7eb170dbf

  • SHA512

    13b148b1f60e277f787e79479a549ec14d0140e92c5798e8fae50388130f81af71f4218939385b64520d36c066e4a6befd120fc53d85d0e55c6841da4e38be82

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      1a5249545d6842d404c718134bc225099013afdb6f8a932ecfc810e7eb170dbf

    • Size

      158KB

    • MD5

      d1cffe4c102caf0843f8f25013fbe2f4

    • SHA1

      b4b099a35624e98e66fbd18f90cff0694b32433d

    • SHA256

      1a5249545d6842d404c718134bc225099013afdb6f8a932ecfc810e7eb170dbf

    • SHA512

      13b148b1f60e277f787e79479a549ec14d0140e92c5798e8fae50388130f81af71f4218939385b64520d36c066e4a6befd120fc53d85d0e55c6841da4e38be82

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks