General

  • Target

    f1j7m5.zip

  • Size

    664KB

  • Sample

    211022-vbnjhscgdq

  • MD5

    9c2bc7ccdc66cc3dad587e05f668b9aa

  • SHA1

    f5c7c0d639dc90aaa42933e8709269dd96effd71

  • SHA256

    044dba2cb102eb631f8bb519b483e6c5b640e2b3e542053f29949e13bb142df2

  • SHA512

    3c239e10680d9c08089b7da513ce1416a9f83394757566c4ff53271c3e1776c0c05fd14bc0a2caebee1cbd20427dee4069b74eef362d70511b9f990f7451ff21

Malware Config

Extracted

Family

dridex

Botnet

10222

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      f1j7m5.zip

    • Size

      664KB

    • MD5

      9c2bc7ccdc66cc3dad587e05f668b9aa

    • SHA1

      f5c7c0d639dc90aaa42933e8709269dd96effd71

    • SHA256

      044dba2cb102eb631f8bb519b483e6c5b640e2b3e542053f29949e13bb142df2

    • SHA512

      3c239e10680d9c08089b7da513ce1416a9f83394757566c4ff53271c3e1776c0c05fd14bc0a2caebee1cbd20427dee4069b74eef362d70511b9f990f7451ff21

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks