General

  • Target

    5356d87ef86953dfd99fd26b28927226

  • Size

    661KB

  • Sample

    210722-zaq2z7mzwx

  • MD5

    5356d87ef86953dfd99fd26b28927226

  • SHA1

    22747f2e92618dbb0fcbf257b577bf29e382e17c

  • SHA256

    8f4306637d344a0673f623cf2b7326fd9b064a5b56b2e88ec3796c879274bf1c

  • SHA512

    dbbf6853483c6979ffcf2e58159b17fb97a9a30196204a27a65171858b2d0aa63e3cf481307f2c97f387584ba79585326661598d9d142e45993bd63b29eb174b

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Targets

    • Target

      5356d87ef86953dfd99fd26b28927226

    • Size

      661KB

    • MD5

      5356d87ef86953dfd99fd26b28927226

    • SHA1

      22747f2e92618dbb0fcbf257b577bf29e382e17c

    • SHA256

      8f4306637d344a0673f623cf2b7326fd9b064a5b56b2e88ec3796c879274bf1c

    • SHA512

      dbbf6853483c6979ffcf2e58159b17fb97a9a30196204a27a65171858b2d0aa63e3cf481307f2c97f387584ba79585326661598d9d142e45993bd63b29eb174b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks