General

  • Target

    hceioc.zip

  • Size

    682KB

  • Sample

    220626-gakvcaagh5

  • MD5

    695d74f98a3530f57efeba7f59f42c70

  • SHA1

    d240ad10acf8f15e8ac29fa8bee58796900bc55a

  • SHA256

    cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85

  • SHA512

    f63280e43b7fb3d048fd1da4d302f57ed0a218dcbedec5e8b188434ff86b78a20bba972e7d9a2b4d981cf1a13433535c976fc3e538c7c5953c568bef718e0b9b

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

77.220.64.37:443

51.15.176.55:3389

85.25.144.36:4643

139.162.53.147:4443

rc4.plain
rc4.plain

Targets

    • Target

      hceioc.zip

    • Size

      682KB

    • MD5

      695d74f98a3530f57efeba7f59f42c70

    • SHA1

      d240ad10acf8f15e8ac29fa8bee58796900bc55a

    • SHA256

      cf44d002356277038c8b9ddf6d5be037b25c34fb5e1cd94750bcaeddb103db85

    • SHA512

      f63280e43b7fb3d048fd1da4d302f57ed0a218dcbedec5e8b188434ff86b78a20bba972e7d9a2b4d981cf1a13433535c976fc3e538c7c5953c568bef718e0b9b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks