General

  • Target

    dcbl8fi.zip

  • Size

    576KB

  • Sample

    220626-f5l58aggbl

  • MD5

    abf64911eb9dd3ca980ca660712567bd

  • SHA1

    3465929617850b18d612f407e280af28cca72286

  • SHA256

    c7f410926c4fe17c41e37d581b9d6908582eb821075ba7d4a20f58161ef154a7

  • SHA512

    77a321b6b26a5f4a83c87cd56a27e185ac4d880240f6cf747e256898c023475af47cd66f121fbae0996063ad42676f731c8baee803eb41502a50d53b4bf1bc21

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

77.220.64.131:443

5.196.204.251:5037

192.99.41.136:981

24.229.3.146:4664

rc4.plain
rc4.plain

Targets

    • Target

      dcbl8fi.zip

    • Size

      576KB

    • MD5

      abf64911eb9dd3ca980ca660712567bd

    • SHA1

      3465929617850b18d612f407e280af28cca72286

    • SHA256

      c7f410926c4fe17c41e37d581b9d6908582eb821075ba7d4a20f58161ef154a7

    • SHA512

      77a321b6b26a5f4a83c87cd56a27e185ac4d880240f6cf747e256898c023475af47cd66f121fbae0996063ad42676f731c8baee803eb41502a50d53b4bf1bc21

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks