General

  • Target

    2b9685ca4ebffc356aa302451bef5e68d33cc87d393675eddff274fcbb170226

  • Size

    160KB

  • Sample

    210624-q7axbnq316

  • MD5

    114d507afab64a0a2249c8ba62f84447

  • SHA1

    33af442a125f9b3476e82d7ed002df5e86d2b4d4

  • SHA256

    2b9685ca4ebffc356aa302451bef5e68d33cc87d393675eddff274fcbb170226

  • SHA512

    1a2fefa296a855b04a822be623be26e3e4d235ee79858732670680002103de42345b4333cfd2f432d826492a457eb37d9fde4be9fdd09ff04f60c4c3c3ca72a4

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      2b9685ca4ebffc356aa302451bef5e68d33cc87d393675eddff274fcbb170226

    • Size

      160KB

    • MD5

      114d507afab64a0a2249c8ba62f84447

    • SHA1

      33af442a125f9b3476e82d7ed002df5e86d2b4d4

    • SHA256

      2b9685ca4ebffc356aa302451bef5e68d33cc87d393675eddff274fcbb170226

    • SHA512

      1a2fefa296a855b04a822be623be26e3e4d235ee79858732670680002103de42345b4333cfd2f432d826492a457eb37d9fde4be9fdd09ff04f60c4c3c3ca72a4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks