General

  • Target

    d682ff1fb542940720caa653f3b8768ad6337b6824eed66f644f1107cab8b09d

  • Size

    158KB

  • Sample

    210625-1zsyxmftan

  • MD5

    a856c8611b00360e8fe165d0b1ae10c0

  • SHA1

    1616d02243c85b1a41d4ed54a4e09ce4c6ed0d1b

  • SHA256

    d682ff1fb542940720caa653f3b8768ad6337b6824eed66f644f1107cab8b09d

  • SHA512

    adbc14f1ee6b81741968ade8564572cd525e64168127984d491e6f451ac35809cf4da5dabc079167e0a990dcccfb982cab51dea1292599cca75eda386caf2928

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      d682ff1fb542940720caa653f3b8768ad6337b6824eed66f644f1107cab8b09d

    • Size

      158KB

    • MD5

      a856c8611b00360e8fe165d0b1ae10c0

    • SHA1

      1616d02243c85b1a41d4ed54a4e09ce4c6ed0d1b

    • SHA256

      d682ff1fb542940720caa653f3b8768ad6337b6824eed66f644f1107cab8b09d

    • SHA512

      adbc14f1ee6b81741968ade8564572cd525e64168127984d491e6f451ac35809cf4da5dabc079167e0a990dcccfb982cab51dea1292599cca75eda386caf2928

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks