General

  • Target

    jknhou4k.zip

  • Size

    785KB

  • Sample

    220611-t77ftsgccr

  • MD5

    adae957f96ecb08a9271bcbe38da2cc5

  • SHA1

    acfaf6b3f0f2c97446e14567ba3fb4d101464ff4

  • SHA256

    6860b23431c03b24449bf266854150b9a1afe5978b84f53803d446696a0e3621

  • SHA512

    9018c290c9bb7ccd576a7dac15ddc1cc4051a9e6026a7013328984f0874638814197ffbb0adda8ee6a43e7d77b6de279585459e0bf12d6eeb2676b99edc150b6

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

209.20.87.138:443

198.1.115.153:8172

151.236.29.248:6516

rc4.plain
rc4.plain

Targets

    • Target

      jknhou4k.zip

    • Size

      785KB

    • MD5

      adae957f96ecb08a9271bcbe38da2cc5

    • SHA1

      acfaf6b3f0f2c97446e14567ba3fb4d101464ff4

    • SHA256

      6860b23431c03b24449bf266854150b9a1afe5978b84f53803d446696a0e3621

    • SHA512

      9018c290c9bb7ccd576a7dac15ddc1cc4051a9e6026a7013328984f0874638814197ffbb0adda8ee6a43e7d77b6de279585459e0bf12d6eeb2676b99edc150b6

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks