General

  • Target

    3017944896f91e4df3644cc765399e3271cb997ea5566442cd53cbc43edc3778

  • Size

    158KB

  • Sample

    210621-wlmkgl17zn

  • MD5

    f189d0811c51cffa709d7d2580befbef

  • SHA1

    d13e4473cc7604d5f83038c0c8e875a9da2605ef

  • SHA256

    3017944896f91e4df3644cc765399e3271cb997ea5566442cd53cbc43edc3778

  • SHA512

    c172bf238f64cc83041f7106184d966d97e574490446c26ce75836823d9dddac0e3e08f1153ad1035e50ea6c8acea68c5d53d23592f5eebc55a159da973fc3a7

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      3017944896f91e4df3644cc765399e3271cb997ea5566442cd53cbc43edc3778

    • Size

      158KB

    • MD5

      f189d0811c51cffa709d7d2580befbef

    • SHA1

      d13e4473cc7604d5f83038c0c8e875a9da2605ef

    • SHA256

      3017944896f91e4df3644cc765399e3271cb997ea5566442cd53cbc43edc3778

    • SHA512

      c172bf238f64cc83041f7106184d966d97e574490446c26ce75836823d9dddac0e3e08f1153ad1035e50ea6c8acea68c5d53d23592f5eebc55a159da973fc3a7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks