General

  • Target

    eb61716d8f37443141eef1bf57ffecf40ddf04c09d3c371ff51da11408d44008

  • Size

    160KB

  • Sample

    210622-b8ynz9w58n

  • MD5

    133b72df4f5064ff13c43b23529970de

  • SHA1

    3b6f8319dc483c6677d883711c66ebe90466c79b

  • SHA256

    eb61716d8f37443141eef1bf57ffecf40ddf04c09d3c371ff51da11408d44008

  • SHA512

    b007dff28305c790729986ff297cd91f8819dfc0a951450878543280bf87ed8ee889f8005fe7c8c5843393b88e37d10a564e6bf2eb12a241c91a753a746a547d

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      eb61716d8f37443141eef1bf57ffecf40ddf04c09d3c371ff51da11408d44008

    • Size

      160KB

    • MD5

      133b72df4f5064ff13c43b23529970de

    • SHA1

      3b6f8319dc483c6677d883711c66ebe90466c79b

    • SHA256

      eb61716d8f37443141eef1bf57ffecf40ddf04c09d3c371ff51da11408d44008

    • SHA512

      b007dff28305c790729986ff297cd91f8819dfc0a951450878543280bf87ed8ee889f8005fe7c8c5843393b88e37d10a564e6bf2eb12a241c91a753a746a547d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks