General

  • Target

    0340ceae3de84b3968aee6c555fda030

  • Size

    315KB

  • Sample

    210721-6cd35kq542

  • MD5

    0340ceae3de84b3968aee6c555fda030

  • SHA1

    4949b8bcd99410bd26c3a2daef7284c39491fe66

  • SHA256

    9f1ca49e69173b3b5df37bbb48f17ce6ad857f4acbb0261f3306c9b1d2232d19

  • SHA512

    4d88991ec16e3189338e54a036ec2414578de709923b3f2eb9d1e8cb2f707dced87ffc71aaaca4ca103e5c84b1db2a72fac0dd3659e0f49c2432c87f3ddd53a7

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Targets

    • Target

      0340ceae3de84b3968aee6c555fda030

    • Size

      315KB

    • MD5

      0340ceae3de84b3968aee6c555fda030

    • SHA1

      4949b8bcd99410bd26c3a2daef7284c39491fe66

    • SHA256

      9f1ca49e69173b3b5df37bbb48f17ce6ad857f4acbb0261f3306c9b1d2232d19

    • SHA512

      4d88991ec16e3189338e54a036ec2414578de709923b3f2eb9d1e8cb2f707dced87ffc71aaaca4ca103e5c84b1db2a72fac0dd3659e0f49c2432c87f3ddd53a7

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks