General

  • Target

    adb1d947f0901a4f3cb0b8ad1a6ee385

  • Size

    175KB

  • Sample

    210721-kq9ylqf1v6

  • MD5

    adb1d947f0901a4f3cb0b8ad1a6ee385

  • SHA1

    b82715bbeab52f75dd44f6396593111ae242632c

  • SHA256

    55bc0af1e99d0310ea3e8668aba02e4d3aa3c800b85fe304a6377968a4668cc1

  • SHA512

    7eea926f405b066917262ad31e109773c40373e6254a25e2b25c53175a8ca7aabc66e275672af38e45eabcd2080f8236078f709ed0332a092cc41b5afea5a606

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Targets

    • Target

      adb1d947f0901a4f3cb0b8ad1a6ee385

    • Size

      175KB

    • MD5

      adb1d947f0901a4f3cb0b8ad1a6ee385

    • SHA1

      b82715bbeab52f75dd44f6396593111ae242632c

    • SHA256

      55bc0af1e99d0310ea3e8668aba02e4d3aa3c800b85fe304a6377968a4668cc1

    • SHA512

      7eea926f405b066917262ad31e109773c40373e6254a25e2b25c53175a8ca7aabc66e275672af38e45eabcd2080f8236078f709ed0332a092cc41b5afea5a606

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks