General

  • Target

    8679548a8d560d18ee1161f1dea6d1bccc28a07adc9cf7483e135ac2cfbf907e

  • Size

    160KB

  • Sample

    210628-pklrn248y2

  • MD5

    0e8f208e7302e552d9522ebd2a469f1c

  • SHA1

    a6908bae791d0a667218b67eb6816d3c086ea95f

  • SHA256

    8679548a8d560d18ee1161f1dea6d1bccc28a07adc9cf7483e135ac2cfbf907e

  • SHA512

    25f75341fbf1a314a64e21e497eabb13a77cfb2514566d6d4135c195498c987c054ee0c877ac819cc961d18308614242e2716174749cadafda9fba1297cc5717

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

94.247.168.64:443

159.203.93.122:8172

50.116.27.97:2303

rc4.plain
rc4.plain

Targets

    • Target

      8679548a8d560d18ee1161f1dea6d1bccc28a07adc9cf7483e135ac2cfbf907e

    • Size

      160KB

    • MD5

      0e8f208e7302e552d9522ebd2a469f1c

    • SHA1

      a6908bae791d0a667218b67eb6816d3c086ea95f

    • SHA256

      8679548a8d560d18ee1161f1dea6d1bccc28a07adc9cf7483e135ac2cfbf907e

    • SHA512

      25f75341fbf1a314a64e21e497eabb13a77cfb2514566d6d4135c195498c987c054ee0c877ac819cc961d18308614242e2716174749cadafda9fba1297cc5717

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks