General

  • Target

    jcpi927p.tar

  • Size

    377KB

  • Sample

    220626-gc971shahk

  • MD5

    df5d80b77f4c8cb272aff888d554a000

  • SHA1

    7180b2fb5396a12e3d40b00c43ef8934c5754f87

  • SHA256

    2f956a58f051e34a280d84a36e8589fea9a9b52d3973ce7c4af5961b8d4e1d96

  • SHA512

    15973a0c3c74ea285e66ce9e7c59b68eddd5f7a083d2421108d5d546f348ce101d1dadce4499c9f57ca09e39721626512c0e86f9b4a4f54fbef34d1c0bdad208

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

131.100.24.215:443

210.65.244.174:6601

195.201.199.53:2303

rc4.plain
rc4.plain

Targets

    • Target

      jcpi927p.tar

    • Size

      377KB

    • MD5

      df5d80b77f4c8cb272aff888d554a000

    • SHA1

      7180b2fb5396a12e3d40b00c43ef8934c5754f87

    • SHA256

      2f956a58f051e34a280d84a36e8589fea9a9b52d3973ce7c4af5961b8d4e1d96

    • SHA512

      15973a0c3c74ea285e66ce9e7c59b68eddd5f7a083d2421108d5d546f348ce101d1dadce4499c9f57ca09e39721626512c0e86f9b4a4f54fbef34d1c0bdad208

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks