General

  • Target

    61eda4b67616b15b16fc9c8077e11e6d573e4131d3fa9b76a2710bea80474a93

  • Size

    158KB

  • Sample

    210626-4ebn16d5ra

  • MD5

    5948252f24690a83fc5b008a08245dfd

  • SHA1

    c281c12113144bf402656f55de6817cffacee571

  • SHA256

    61eda4b67616b15b16fc9c8077e11e6d573e4131d3fa9b76a2710bea80474a93

  • SHA512

    a5d9231b04e5ed776f2126bd2f58b12bb61bbb5529ff2010302213ba56c8047703cac93069ad120ff170baf6e749a9887f141bab91769a3e751baa7d227c1beb

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      61eda4b67616b15b16fc9c8077e11e6d573e4131d3fa9b76a2710bea80474a93

    • Size

      158KB

    • MD5

      5948252f24690a83fc5b008a08245dfd

    • SHA1

      c281c12113144bf402656f55de6817cffacee571

    • SHA256

      61eda4b67616b15b16fc9c8077e11e6d573e4131d3fa9b76a2710bea80474a93

    • SHA512

      a5d9231b04e5ed776f2126bd2f58b12bb61bbb5529ff2010302213ba56c8047703cac93069ad120ff170baf6e749a9887f141bab91769a3e751baa7d227c1beb

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks