General

  • Target

    20e9b8f612852a93e8ad406f6b708c7a

  • Size

    750KB

  • Sample

    211027-t22cmafff6

  • MD5

    20e9b8f612852a93e8ad406f6b708c7a

  • SHA1

    ed4736c49dfcd81f9fb02c294ea7ab7be810ac75

  • SHA256

    bc9be656637339827588dadbf2b611ac1dad01a1e35da68a400649333a0c18ca

  • SHA512

    28a72ae4c5037b4a720ac923b743bdfd4274a4a15a5b15e68ccebf7adc3112af7f06a8430d265785d690c9e71fd13e87124066f714c1df9f51796210a3e5b539

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Targets

    • Target

      20e9b8f612852a93e8ad406f6b708c7a

    • Size

      750KB

    • MD5

      20e9b8f612852a93e8ad406f6b708c7a

    • SHA1

      ed4736c49dfcd81f9fb02c294ea7ab7be810ac75

    • SHA256

      bc9be656637339827588dadbf2b611ac1dad01a1e35da68a400649333a0c18ca

    • SHA512

      28a72ae4c5037b4a720ac923b743bdfd4274a4a15a5b15e68ccebf7adc3112af7f06a8430d265785d690c9e71fd13e87124066f714c1df9f51796210a3e5b539

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks