General

  • Target

    73d35b1d8d4fa3aea2bfb84b83e9906f

  • Size

    750KB

  • Sample

    211027-t22cmafff7

  • MD5

    73d35b1d8d4fa3aea2bfb84b83e9906f

  • SHA1

    a9c748bf817dc2b0277f1dbab623700e0cf11cf6

  • SHA256

    cb14cf0bd5f6a2c51780788faf221f362c33746c35d679a8139434e04529b601

  • SHA512

    f67ce19f438c0fe61ccf51646a85c60b7aca418de0bc2b53902c8f2f28cdbf25d69711b3a22197bdb53d957c03a5fec2fa0e53361f1f44cd93711d8bd95b7868

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Targets

    • Target

      73d35b1d8d4fa3aea2bfb84b83e9906f

    • Size

      750KB

    • MD5

      73d35b1d8d4fa3aea2bfb84b83e9906f

    • SHA1

      a9c748bf817dc2b0277f1dbab623700e0cf11cf6

    • SHA256

      cb14cf0bd5f6a2c51780788faf221f362c33746c35d679a8139434e04529b601

    • SHA512

      f67ce19f438c0fe61ccf51646a85c60b7aca418de0bc2b53902c8f2f28cdbf25d69711b3a22197bdb53d957c03a5fec2fa0e53361f1f44cd93711d8bd95b7868

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks