General

  • Target

    c918c54190c0b705e1ff463933ec032373e3105772ffeca844c0b9b136ebef3a

  • Size

    158KB

  • Sample

    210623-dlebrff416

  • MD5

    1ce8e9f508dcd359783dd9e40f2c3a41

  • SHA1

    f513ea3e78b03eceb64bb8421b12613e94151004

  • SHA256

    c918c54190c0b705e1ff463933ec032373e3105772ffeca844c0b9b136ebef3a

  • SHA512

    02d16c8dd75bc15259a5b744e0eeeaa403ecf03d4978036008559300f4163a311637934aa4dcfcca650a7ab77ed2d8afc1e2d82b25db9514128d1f3f85ee2cc3

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      c918c54190c0b705e1ff463933ec032373e3105772ffeca844c0b9b136ebef3a

    • Size

      158KB

    • MD5

      1ce8e9f508dcd359783dd9e40f2c3a41

    • SHA1

      f513ea3e78b03eceb64bb8421b12613e94151004

    • SHA256

      c918c54190c0b705e1ff463933ec032373e3105772ffeca844c0b9b136ebef3a

    • SHA512

      02d16c8dd75bc15259a5b744e0eeeaa403ecf03d4978036008559300f4163a311637934aa4dcfcca650a7ab77ed2d8afc1e2d82b25db9514128d1f3f85ee2cc3

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks