General

  • Target

    dd5edd790776b193950294f8895969fde29014a70619ae416e3c82ca37417fc6

  • Size

    158KB

  • Sample

    210629-jfl5acn4qe

  • MD5

    9e294b96074d1e553c52b4f610431a11

  • SHA1

    6a01e4db385ae88a16836a73587247db65d99c0a

  • SHA256

    dd5edd790776b193950294f8895969fde29014a70619ae416e3c82ca37417fc6

  • SHA512

    d9a271e71056153bdf5657f63702eb33062bef679365a005e1a00a4617b0da81ef268d1d9816d57a6e2f3e3b006f2372e73a21ea9bfe71f12b806912b5cdb200

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

8.210.53.215:443

72.249.22.245:2303

188.40.137.206:8172

rc4.plain
rc4.plain

Targets

    • Target

      dd5edd790776b193950294f8895969fde29014a70619ae416e3c82ca37417fc6

    • Size

      158KB

    • MD5

      9e294b96074d1e553c52b4f610431a11

    • SHA1

      6a01e4db385ae88a16836a73587247db65d99c0a

    • SHA256

      dd5edd790776b193950294f8895969fde29014a70619ae416e3c82ca37417fc6

    • SHA512

      d9a271e71056153bdf5657f63702eb33062bef679365a005e1a00a4617b0da81ef268d1d9816d57a6e2f3e3b006f2372e73a21ea9bfe71f12b806912b5cdb200

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks