General

  • Target

    006681b1b4f6979254f1425065e602328fc190099b6079feba77d9cdebb6abad

  • Size

    160KB

  • Sample

    210625-ngh3w7ztt2

  • MD5

    451066ba8980bfb8a2843343bf05a7f0

  • SHA1

    49f00b4ff3596e8bcf78e189488366550f35cc6d

  • SHA256

    006681b1b4f6979254f1425065e602328fc190099b6079feba77d9cdebb6abad

  • SHA512

    80dc1e60a7e25ab2ccdcda5214f1917b54cfbfefa65519e45e4563bab4fb550e4efcff9fca393071b760bb3d0fb20083785c0e0edba951c57a85fe7e8965f61f

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      006681b1b4f6979254f1425065e602328fc190099b6079feba77d9cdebb6abad

    • Size

      160KB

    • MD5

      451066ba8980bfb8a2843343bf05a7f0

    • SHA1

      49f00b4ff3596e8bcf78e189488366550f35cc6d

    • SHA256

      006681b1b4f6979254f1425065e602328fc190099b6079feba77d9cdebb6abad

    • SHA512

      80dc1e60a7e25ab2ccdcda5214f1917b54cfbfefa65519e45e4563bab4fb550e4efcff9fca393071b760bb3d0fb20083785c0e0edba951c57a85fe7e8965f61f

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks