General

  • Target

    58d1658a62bd46e125e3900426750cbaf1deb4728d104865fb4f0bd5f6953814

  • Size

    158KB

  • Sample

    210628-yar53v37qa

  • MD5

    c34675569ad8504cdc4c87cd1a42c209

  • SHA1

    755e4635b44e86743aaba8ee161ec696b966ac1c

  • SHA256

    58d1658a62bd46e125e3900426750cbaf1deb4728d104865fb4f0bd5f6953814

  • SHA512

    460b1d1afdc47b179d8612db8d3bfa1d31b109728bd89753da2f05c416c71f036f0d2c321c91ad19eda787d0a9bfdd0b7d68dd0d13c92891ba857e1bcb3d91ba

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      58d1658a62bd46e125e3900426750cbaf1deb4728d104865fb4f0bd5f6953814

    • Size

      158KB

    • MD5

      c34675569ad8504cdc4c87cd1a42c209

    • SHA1

      755e4635b44e86743aaba8ee161ec696b966ac1c

    • SHA256

      58d1658a62bd46e125e3900426750cbaf1deb4728d104865fb4f0bd5f6953814

    • SHA512

      460b1d1afdc47b179d8612db8d3bfa1d31b109728bd89753da2f05c416c71f036f0d2c321c91ad19eda787d0a9bfdd0b7d68dd0d13c92891ba857e1bcb3d91ba

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks