General

  • Target

    kznyhj.rar

  • Size

    1.0MB

  • Sample

    220626-gevkcahbdl

  • MD5

    54406a46537707356be7ae715803089c

  • SHA1

    81a90d9e6b412cf9a6c834927e8ebeb939bc12aa

  • SHA256

    60e734bb4ac85f8a03cfa3147c7f887b2c043e66c64d6ebd1091771c07b779a4

  • SHA512

    7bbd7efa002c17492712dd5d929957966c8ded8a5080f5dc53f71c3ec96282f919cb6e64d649d199aa38b6c0b982fc1017b379d7898b04093c7c297d6423addc

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Targets

    • Target

      kznyhj.rar

    • Size

      1.0MB

    • MD5

      54406a46537707356be7ae715803089c

    • SHA1

      81a90d9e6b412cf9a6c834927e8ebeb939bc12aa

    • SHA256

      60e734bb4ac85f8a03cfa3147c7f887b2c043e66c64d6ebd1091771c07b779a4

    • SHA512

      7bbd7efa002c17492712dd5d929957966c8ded8a5080f5dc53f71c3ec96282f919cb6e64d649d199aa38b6c0b982fc1017b379d7898b04093c7c297d6423addc

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks