General

  • Target

    9da5d919eeaf178b13a431bd3afc1982fd013639ba07bb965606c37cc5d877b6

  • Size

    158KB

  • Sample

    210625-wtcmdkrcye

  • MD5

    1c647114257bf5d63928de795f20ec12

  • SHA1

    dd7bb8ca5bccb7fc7a81c913ea789bbbf1fca882

  • SHA256

    9da5d919eeaf178b13a431bd3afc1982fd013639ba07bb965606c37cc5d877b6

  • SHA512

    1a063a7633e1b1a575dc99dd2319639f70287ecb428c013e0363c574850019d3b84fd63d88cc9577c6d5c182ab6cadfb1fc63c0817ed08f32530f8ed8e8cfadd

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      9da5d919eeaf178b13a431bd3afc1982fd013639ba07bb965606c37cc5d877b6

    • Size

      158KB

    • MD5

      1c647114257bf5d63928de795f20ec12

    • SHA1

      dd7bb8ca5bccb7fc7a81c913ea789bbbf1fca882

    • SHA256

      9da5d919eeaf178b13a431bd3afc1982fd013639ba07bb965606c37cc5d877b6

    • SHA512

      1a063a7633e1b1a575dc99dd2319639f70287ecb428c013e0363c574850019d3b84fd63d88cc9577c6d5c182ab6cadfb1fc63c0817ed08f32530f8ed8e8cfadd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks