General

  • Target

    0de061b501ef252ba79dd83517f8458d2ed9d0885e84ea7ce2eec3530744ea31

  • Size

    160KB

  • Sample

    210621-zh1ty4nhlj

  • MD5

    ed74bdbeec996f62244b7a2880f0994c

  • SHA1

    2dc87d4e141d11ffb60f99deac21dcb111baf4f4

  • SHA256

    0de061b501ef252ba79dd83517f8458d2ed9d0885e84ea7ce2eec3530744ea31

  • SHA512

    85ff513fd9a757762059fab092017f8783a4689525861939217a0d320773ba592739964c2b3752056198235e9c17b1700fbe0527dbd16c27f617914e318754c7

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      0de061b501ef252ba79dd83517f8458d2ed9d0885e84ea7ce2eec3530744ea31

    • Size

      160KB

    • MD5

      ed74bdbeec996f62244b7a2880f0994c

    • SHA1

      2dc87d4e141d11ffb60f99deac21dcb111baf4f4

    • SHA256

      0de061b501ef252ba79dd83517f8458d2ed9d0885e84ea7ce2eec3530744ea31

    • SHA512

      85ff513fd9a757762059fab092017f8783a4689525861939217a0d320773ba592739964c2b3752056198235e9c17b1700fbe0527dbd16c27f617914e318754c7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks