General

  • Target

    a859edc37cecc933b48661f07d6cb967718f0de50a822db02e16b845ee374654

  • Size

    158KB

  • Sample

    210628-z55h9na8yj

  • MD5

    bb65423ebcd40b60bc1498e5270783eb

  • SHA1

    0741879f51c886c798c8603af7860ad9128d6cd3

  • SHA256

    a859edc37cecc933b48661f07d6cb967718f0de50a822db02e16b845ee374654

  • SHA512

    29be2fa097000338afe84c5b5363e69c4c267b17fc593d2c1399790f9d6b5ceba1696389acecb4039dc7c3b0f091089eed229e70f606c05a4077490236fa140c

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      a859edc37cecc933b48661f07d6cb967718f0de50a822db02e16b845ee374654

    • Size

      158KB

    • MD5

      bb65423ebcd40b60bc1498e5270783eb

    • SHA1

      0741879f51c886c798c8603af7860ad9128d6cd3

    • SHA256

      a859edc37cecc933b48661f07d6cb967718f0de50a822db02e16b845ee374654

    • SHA512

      29be2fa097000338afe84c5b5363e69c4c267b17fc593d2c1399790f9d6b5ceba1696389acecb4039dc7c3b0f091089eed229e70f606c05a4077490236fa140c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks