General

  • Target

    e87600f11c67d2d8ac34f660bf737d41

  • Size

    750KB

  • Sample

    211027-t5xhvafga6

  • MD5

    e87600f11c67d2d8ac34f660bf737d41

  • SHA1

    b1c1152bfeee0bf51634829b061afd1826aaf5d5

  • SHA256

    b1a0aeb53b2711972011ec2c0501f5fb5ea1dc075403a0c4db963d07e7160b94

  • SHA512

    9c131fdb9ead4d94e9844d08c5be31e1a07972a0d3b9e87908fa3d4b27282cba9f622b21f192f4b6f958a339e07d54d129ab90e5c72f72252aaf1878de2e90ac

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Targets

    • Target

      e87600f11c67d2d8ac34f660bf737d41

    • Size

      750KB

    • MD5

      e87600f11c67d2d8ac34f660bf737d41

    • SHA1

      b1c1152bfeee0bf51634829b061afd1826aaf5d5

    • SHA256

      b1a0aeb53b2711972011ec2c0501f5fb5ea1dc075403a0c4db963d07e7160b94

    • SHA512

      9c131fdb9ead4d94e9844d08c5be31e1a07972a0d3b9e87908fa3d4b27282cba9f622b21f192f4b6f958a339e07d54d129ab90e5c72f72252aaf1878de2e90ac

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks