General

  • Target

    b52bc488ecd8032acb1869d9b742531acc533427d60b471fb4299740afa99eff

  • Size

    162KB

  • Sample

    210623-slgrzvqb46

  • MD5

    f6f53a62592641fe1f170b1d8883b250

  • SHA1

    0da6434486c6952bcb1c49e79013be955a621117

  • SHA256

    b52bc488ecd8032acb1869d9b742531acc533427d60b471fb4299740afa99eff

  • SHA512

    4b35708e37a79d188b096bcdbfabf6264cb90b420d81e56c5ddb04f28d59a1738c184cb9d9479913faefa98d54d83b34c9e5c9a5faf417fc0c703caa84ac2fd8

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      b52bc488ecd8032acb1869d9b742531acc533427d60b471fb4299740afa99eff

    • Size

      162KB

    • MD5

      f6f53a62592641fe1f170b1d8883b250

    • SHA1

      0da6434486c6952bcb1c49e79013be955a621117

    • SHA256

      b52bc488ecd8032acb1869d9b742531acc533427d60b471fb4299740afa99eff

    • SHA512

      4b35708e37a79d188b096bcdbfabf6264cb90b420d81e56c5ddb04f28d59a1738c184cb9d9479913faefa98d54d83b34c9e5c9a5faf417fc0c703caa84ac2fd8

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks