General

  • Target

    eb1a5bd9338c335ee0248fde6f0339612539dda6a9b933ca111b223eafb67052

  • Size

    158KB

  • Sample

    210625-5t93ztb742

  • MD5

    2c6f4c7892c709eb77e248f948770057

  • SHA1

    d649996a907cd857905218eb4761cfac5df56b8b

  • SHA256

    eb1a5bd9338c335ee0248fde6f0339612539dda6a9b933ca111b223eafb67052

  • SHA512

    09325054166fa4c37e060ff7441b1603634269acd630546ade053ff7c9d7346ad99ec2ab908f3a9c21d462a572bd6263149326a53c126c187c8ae5fd85fa6b86

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      eb1a5bd9338c335ee0248fde6f0339612539dda6a9b933ca111b223eafb67052

    • Size

      158KB

    • MD5

      2c6f4c7892c709eb77e248f948770057

    • SHA1

      d649996a907cd857905218eb4761cfac5df56b8b

    • SHA256

      eb1a5bd9338c335ee0248fde6f0339612539dda6a9b933ca111b223eafb67052

    • SHA512

      09325054166fa4c37e060ff7441b1603634269acd630546ade053ff7c9d7346ad99ec2ab908f3a9c21d462a572bd6263149326a53c126c187c8ae5fd85fa6b86

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks