General

  • Target

    06ccccaae19a863c46377bd745410884ae219bb0c5ed6902b1ba70a85fe10f77

  • Size

    158KB

  • Sample

    210621-nwy5fr5daj

  • MD5

    80bbd344948cc1a6e4e3ff624ae75049

  • SHA1

    c147bae622b5418c675010d9531beffe88aa3489

  • SHA256

    06ccccaae19a863c46377bd745410884ae219bb0c5ed6902b1ba70a85fe10f77

  • SHA512

    6a9c3080042f8a387ec0f7f30d99b5c78b26430c43066a8232370f6954c54575a73416ef75665b93ef0a675abfead3dff76bbb9f306057f4ba3aa38110997928

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      06ccccaae19a863c46377bd745410884ae219bb0c5ed6902b1ba70a85fe10f77

    • Size

      158KB

    • MD5

      80bbd344948cc1a6e4e3ff624ae75049

    • SHA1

      c147bae622b5418c675010d9531beffe88aa3489

    • SHA256

      06ccccaae19a863c46377bd745410884ae219bb0c5ed6902b1ba70a85fe10f77

    • SHA512

      6a9c3080042f8a387ec0f7f30d99b5c78b26430c43066a8232370f6954c54575a73416ef75665b93ef0a675abfead3dff76bbb9f306057f4ba3aa38110997928

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks