General

  • Target

    8814f108250b5d1a368903bafc39db995ee6ba17f66c7c22600a3c32013966ec

  • Size

    158KB

  • Sample

    210624-cbdrzhq282

  • MD5

    4a30c9407e650a401891224ec3e04dfe

  • SHA1

    481995da2d45f74bacae3d97456e933fcb0cdd5c

  • SHA256

    8814f108250b5d1a368903bafc39db995ee6ba17f66c7c22600a3c32013966ec

  • SHA512

    277be9d54924a014c5f54376c89a19036d4c1a06f1f92e1a3abb8f51ff6777c30277a30346cdc0018c67b1d5997648210136c79351b2bfe4619ae37e65590f61

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      8814f108250b5d1a368903bafc39db995ee6ba17f66c7c22600a3c32013966ec

    • Size

      158KB

    • MD5

      4a30c9407e650a401891224ec3e04dfe

    • SHA1

      481995da2d45f74bacae3d97456e933fcb0cdd5c

    • SHA256

      8814f108250b5d1a368903bafc39db995ee6ba17f66c7c22600a3c32013966ec

    • SHA512

      277be9d54924a014c5f54376c89a19036d4c1a06f1f92e1a3abb8f51ff6777c30277a30346cdc0018c67b1d5997648210136c79351b2bfe4619ae37e65590f61

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks