General

  • Target

    940486180a442af62a053108ab25d41a6ea50ab35cd081c5aeda372174a24cfe

  • Size

    160KB

  • Sample

    210623-ce11xn46ma

  • MD5

    108c90cbf6b7897a5874f430859fb067

  • SHA1

    959ccda763c3af82eb7a2c91f434c181104db524

  • SHA256

    940486180a442af62a053108ab25d41a6ea50ab35cd081c5aeda372174a24cfe

  • SHA512

    3b5894466327c4149878c4a88099362efa7c72591af6269b414fce0a290be87ea3fda645b1f439484858d9cfbca37698a0b6e571a0a1b7eeafcc09a87470db3d

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      940486180a442af62a053108ab25d41a6ea50ab35cd081c5aeda372174a24cfe

    • Size

      160KB

    • MD5

      108c90cbf6b7897a5874f430859fb067

    • SHA1

      959ccda763c3af82eb7a2c91f434c181104db524

    • SHA256

      940486180a442af62a053108ab25d41a6ea50ab35cd081c5aeda372174a24cfe

    • SHA512

      3b5894466327c4149878c4a88099362efa7c72591af6269b414fce0a290be87ea3fda645b1f439484858d9cfbca37698a0b6e571a0a1b7eeafcc09a87470db3d

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks