General

  • Target

    c55dd702da86e6d85e4829831aee6a9e

  • Size

    750KB

  • Sample

    211027-vlt42sfge2

  • MD5

    c55dd702da86e6d85e4829831aee6a9e

  • SHA1

    4a9d4f9564c54d8a82da45a963ec71dc8644cd3b

  • SHA256

    e945693ff948a0e175152f72eb1ef3111b08ca2163c1ebfecd9d3f084a0c3210

  • SHA512

    ed41547cbed01955f4b2532511fcd4bcefa60304bd0dd6f4cc3b2e85443377e4ba17247a880d4f6db3179541558d8391ac9421d67d29ac2df3f0951ce55efaab

Malware Config

Extracted

Family

dridex

Botnet

10555

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Targets

    • Target

      c55dd702da86e6d85e4829831aee6a9e

    • Size

      750KB

    • MD5

      c55dd702da86e6d85e4829831aee6a9e

    • SHA1

      4a9d4f9564c54d8a82da45a963ec71dc8644cd3b

    • SHA256

      e945693ff948a0e175152f72eb1ef3111b08ca2163c1ebfecd9d3f084a0c3210

    • SHA512

      ed41547cbed01955f4b2532511fcd4bcefa60304bd0dd6f4cc3b2e85443377e4ba17247a880d4f6db3179541558d8391ac9421d67d29ac2df3f0951ce55efaab

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks