General

  • Target

    49afe758c6688a885fae96f168982ffbdb3252fae04b61978c75ac1f10480a73

  • Size

    162KB

  • Sample

    210629-xbflgpkh1x

  • MD5

    9e3f653067a860086f1fe343071a7934

  • SHA1

    ea3e024ad03d0a1f80da7b6e61d469fc1a066172

  • SHA256

    49afe758c6688a885fae96f168982ffbdb3252fae04b61978c75ac1f10480a73

  • SHA512

    75b6fe2b41554f28f64cf794bbfabfda42a3d5b9d61fdc7e5e2340b9d0d4a9a05315aed29aec1ef949666ad66672ee65659fc2e839ce82054f16ccc8c123835c

Malware Config

Extracted

Family

dridex

Botnet

40112

C2

107.172.227.10:443

172.93.133.123:2303

108.168.61.147:8172

rc4.plain
rc4.plain

Targets

    • Target

      49afe758c6688a885fae96f168982ffbdb3252fae04b61978c75ac1f10480a73

    • Size

      162KB

    • MD5

      9e3f653067a860086f1fe343071a7934

    • SHA1

      ea3e024ad03d0a1f80da7b6e61d469fc1a066172

    • SHA256

      49afe758c6688a885fae96f168982ffbdb3252fae04b61978c75ac1f10480a73

    • SHA512

      75b6fe2b41554f28f64cf794bbfabfda42a3d5b9d61fdc7e5e2340b9d0d4a9a05315aed29aec1ef949666ad66672ee65659fc2e839ce82054f16ccc8c123835c

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks