General

  • Target

    560398544adbddff5478370441b3b924460197340d31a83627b95a2d5ca2bdc0

  • Size

    160KB

  • Sample

    210623-6wzkn283ta

  • MD5

    cf7bf52777cd206a03898e57578cb77a

  • SHA1

    224eaca0b6299b9d6f49ed5ff752bfc13fcd6976

  • SHA256

    560398544adbddff5478370441b3b924460197340d31a83627b95a2d5ca2bdc0

  • SHA512

    4e00d585886c67495ea6326e34fe94ff9f6199eff1b00e0394a971fb33feb646960c35651f56688b7eae0ec16fd9f6d49fca55acc31ffd7350c55088d3df83dd

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      560398544adbddff5478370441b3b924460197340d31a83627b95a2d5ca2bdc0

    • Size

      160KB

    • MD5

      cf7bf52777cd206a03898e57578cb77a

    • SHA1

      224eaca0b6299b9d6f49ed5ff752bfc13fcd6976

    • SHA256

      560398544adbddff5478370441b3b924460197340d31a83627b95a2d5ca2bdc0

    • SHA512

      4e00d585886c67495ea6326e34fe94ff9f6199eff1b00e0394a971fb33feb646960c35651f56688b7eae0ec16fd9f6d49fca55acc31ffd7350c55088d3df83dd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks