General

  • Target

    0e5061f567e06e99cf857522e537a30f3d77823540737c3eec6a6e2663eaee77

  • Size

    158KB

  • Sample

    210625-a6wwnm48vx

  • MD5

    5491a8438b754712a00cb688e7cd4c94

  • SHA1

    41b050ca02ccc8394309889eca6eb5a30f485e73

  • SHA256

    0e5061f567e06e99cf857522e537a30f3d77823540737c3eec6a6e2663eaee77

  • SHA512

    7c204d4b40983011b971c55365551a10896e247b7b09f269715ff52903549bac6cefae84de61a364298ba1d47e1495842341802728178dc992baba471981fd43

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      0e5061f567e06e99cf857522e537a30f3d77823540737c3eec6a6e2663eaee77

    • Size

      158KB

    • MD5

      5491a8438b754712a00cb688e7cd4c94

    • SHA1

      41b050ca02ccc8394309889eca6eb5a30f485e73

    • SHA256

      0e5061f567e06e99cf857522e537a30f3d77823540737c3eec6a6e2663eaee77

    • SHA512

      7c204d4b40983011b971c55365551a10896e247b7b09f269715ff52903549bac6cefae84de61a364298ba1d47e1495842341802728178dc992baba471981fd43

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks