General

  • Target

    12b70758d432c5ba73934a71bb229c09bdcab957d7e89aff49a1656e78888b99

  • Size

    162KB

  • Sample

    210624-84ftf75ssa

  • MD5

    6cdd6669cb66336de4a6c773e4bd7b43

  • SHA1

    38f878a5504ee808f158db22726ecad199aab5ab

  • SHA256

    12b70758d432c5ba73934a71bb229c09bdcab957d7e89aff49a1656e78888b99

  • SHA512

    e8fb3db0d27b2bf8e671990ab40977485394e2544842cfda059f65d95bc507911a0562638f167cc3f19a9c31c8df937c3facb11c5b4f7d9c7ec557ddc16941fe

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      12b70758d432c5ba73934a71bb229c09bdcab957d7e89aff49a1656e78888b99

    • Size

      162KB

    • MD5

      6cdd6669cb66336de4a6c773e4bd7b43

    • SHA1

      38f878a5504ee808f158db22726ecad199aab5ab

    • SHA256

      12b70758d432c5ba73934a71bb229c09bdcab957d7e89aff49a1656e78888b99

    • SHA512

      e8fb3db0d27b2bf8e671990ab40977485394e2544842cfda059f65d95bc507911a0562638f167cc3f19a9c31c8df937c3facb11c5b4f7d9c7ec557ddc16941fe

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks