General

  • Target

    r6x7x6rf.zipruelmxqg

  • Size

    864KB

  • Sample

    220626-gm2zdshdel

  • MD5

    d51dfce479bc8731a7489fabec3538c6

  • SHA1

    4c45a11b9d18b243d5f7c9183cf316e6d545212d

  • SHA256

    c83b1f21b3c13741c8047162999e5c60b7360342713f095719b22837eae0b01d

  • SHA512

    f30007eb503775c908a2b4406f5c763257cf28c5935f7d9b74fab532ba299447e5c11470beb1fbfa773b92b92011e10b87948f91e715c60ac08517d808d48e57

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

131.100.24.192:443

103.6.213.203:6601

46.41.130.218:2303

rc4.plain
rc4.plain

Targets

    • Target

      r6x7x6rf.zipruelmxqg

    • Size

      864KB

    • MD5

      d51dfce479bc8731a7489fabec3538c6

    • SHA1

      4c45a11b9d18b243d5f7c9183cf316e6d545212d

    • SHA256

      c83b1f21b3c13741c8047162999e5c60b7360342713f095719b22837eae0b01d

    • SHA512

      f30007eb503775c908a2b4406f5c763257cf28c5935f7d9b74fab532ba299447e5c11470beb1fbfa773b92b92011e10b87948f91e715c60ac08517d808d48e57

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks