General

  • Target

    ac713d5e4ba95e42cad27b6def936c4d

  • Size

    188KB

  • Sample

    240228-vzl1lahg42

  • MD5

    ac713d5e4ba95e42cad27b6def936c4d

  • SHA1

    5cbf978020b41575dc80e5c9a1cc14e665056888

  • SHA256

    4d4eee6e8db3357dcefe1db6071639375c2b04bed9458575a06a60d95f64c162

  • SHA512

    da5b3eaff8a35e0774989587c9c3c0539e1673e8bc2ed8ce20982a4c4cb8db85f01c73954d4d03f5c1c78ac6c30aecd6860e7d242ec6ad9db4451faa2cf3263f

  • SSDEEP

    3072:iA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAovo:izIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      ac713d5e4ba95e42cad27b6def936c4d

    • Size

      188KB

    • MD5

      ac713d5e4ba95e42cad27b6def936c4d

    • SHA1

      5cbf978020b41575dc80e5c9a1cc14e665056888

    • SHA256

      4d4eee6e8db3357dcefe1db6071639375c2b04bed9458575a06a60d95f64c162

    • SHA512

      da5b3eaff8a35e0774989587c9c3c0539e1673e8bc2ed8ce20982a4c4cb8db85f01c73954d4d03f5c1c78ac6c30aecd6860e7d242ec6ad9db4451faa2cf3263f

    • SSDEEP

      3072:iA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAovo:izIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks