General

  • Target

    91c286b4cca190e751c95321448de0ba7fcdaf2a046dece6197faac353ca5299

  • Size

    160KB

  • Sample

    210627-9bz8pm9vg6

  • MD5

    91c1f666b7aaf585b5be951e99555b12

  • SHA1

    4b1c23d156f49e4f3562723199ddc02b06627818

  • SHA256

    91c286b4cca190e751c95321448de0ba7fcdaf2a046dece6197faac353ca5299

  • SHA512

    522d4da0d58acd54288524127b66ddf2550a2eea1803ff56de2469ca882345b2d084887aed42447be104173df3f1614d939e44026e8a52191b348ee9ca27b6c4

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      91c286b4cca190e751c95321448de0ba7fcdaf2a046dece6197faac353ca5299

    • Size

      160KB

    • MD5

      91c1f666b7aaf585b5be951e99555b12

    • SHA1

      4b1c23d156f49e4f3562723199ddc02b06627818

    • SHA256

      91c286b4cca190e751c95321448de0ba7fcdaf2a046dece6197faac353ca5299

    • SHA512

      522d4da0d58acd54288524127b66ddf2550a2eea1803ff56de2469ca882345b2d084887aed42447be104173df3f1614d939e44026e8a52191b348ee9ca27b6c4

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks