General

  • Target

    aae1e725e2dbfd91213be22e857f9d02

  • Size

    176KB

  • Sample

    210721-l4brgzs62e

  • MD5

    aae1e725e2dbfd91213be22e857f9d02

  • SHA1

    7a2c52b1185e6024787eadaf18bd7f7ccfaa0f14

  • SHA256

    3cba24dba02d5817a029caee6eadf1b3b4eb75ff861c62df3e4d4fbde1c349c2

  • SHA512

    6f63202d5f64789b92a1a43ad497eb38941bd7aa9ab466500b3d6504266da8c71265d3d476a9a4a682c074c883b2c0d2c44ad2da1e4ce65bb1a9f37cda7bc930

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Targets

    • Target

      aae1e725e2dbfd91213be22e857f9d02

    • Size

      176KB

    • MD5

      aae1e725e2dbfd91213be22e857f9d02

    • SHA1

      7a2c52b1185e6024787eadaf18bd7f7ccfaa0f14

    • SHA256

      3cba24dba02d5817a029caee6eadf1b3b4eb75ff861c62df3e4d4fbde1c349c2

    • SHA512

      6f63202d5f64789b92a1a43ad497eb38941bd7aa9ab466500b3d6504266da8c71265d3d476a9a4a682c074c883b2c0d2c44ad2da1e4ce65bb1a9f37cda7bc930

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks