General

  • Target

    d1ea96f7778a90af5a09a1234a970a7c

  • Size

    750KB

  • Sample

    211027-v9bydafhf3

  • MD5

    d1ea96f7778a90af5a09a1234a970a7c

  • SHA1

    fac82721de95a8570f2c72ca42698737e2bcd596

  • SHA256

    0be93171ce8ad3f191f162b72b8ca669b06ca442c874df894023b3b918a9899e

  • SHA512

    9a3b79943e66b3445039dbc596c12778ec5c933fab18dd3716ab21f52de5f2d47905838bc35386adea781af89f11ca29b2a54fc3280dece8906b63828c57e4fd

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Targets

    • Target

      d1ea96f7778a90af5a09a1234a970a7c

    • Size

      750KB

    • MD5

      d1ea96f7778a90af5a09a1234a970a7c

    • SHA1

      fac82721de95a8570f2c72ca42698737e2bcd596

    • SHA256

      0be93171ce8ad3f191f162b72b8ca669b06ca442c874df894023b3b918a9899e

    • SHA512

      9a3b79943e66b3445039dbc596c12778ec5c933fab18dd3716ab21f52de5f2d47905838bc35386adea781af89f11ca29b2a54fc3280dece8906b63828c57e4fd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks