General

  • Target

    3d67b0c7d220a241c6eb2ed5660ac458

  • Size

    655KB

  • Sample

    210721-6sbnq8hlyn

  • MD5

    3d67b0c7d220a241c6eb2ed5660ac458

  • SHA1

    fceed53a83a376274c92d26c870f7b4abd201f56

  • SHA256

    4bf58623f91ff9a19c2893061a2a14660f61b2294f976a9d80ab6b3d023c9892

  • SHA512

    b2bd38913d4c144cb6e01d6f5281d54fe864467a730839c063f54180be2bd86ea8541e5ca6b97ed3321e0caea711cec4883e56ca74bc9932d4a271866b833fe9

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Targets

    • Target

      3d67b0c7d220a241c6eb2ed5660ac458

    • Size

      655KB

    • MD5

      3d67b0c7d220a241c6eb2ed5660ac458

    • SHA1

      fceed53a83a376274c92d26c870f7b4abd201f56

    • SHA256

      4bf58623f91ff9a19c2893061a2a14660f61b2294f976a9d80ab6b3d023c9892

    • SHA512

      b2bd38913d4c144cb6e01d6f5281d54fe864467a730839c063f54180be2bd86ea8541e5ca6b97ed3321e0caea711cec4883e56ca74bc9932d4a271866b833fe9

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks