General

  • Target

    e22fdeb84f0434c76d095f0fb3228391

  • Size

    188KB

  • Sample

    240327-vt2tvsgh23

  • MD5

    e22fdeb84f0434c76d095f0fb3228391

  • SHA1

    19ed955bda6f287917d7c3308b561e466fe2b34a

  • SHA256

    1cf1310269493163b26652c6f7d71552f235e0702ee46fe2aed99334cffdf465

  • SHA512

    8abbbaed8b8adb433d09524735a7c3c7fea13ef41567886e78de2a1fc32c7c4baa483801847b0fb94662b8f966f8863b832957aba7f08f279ff4bb4ff90ca90b

  • SSDEEP

    3072:VA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAodo:VzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      e22fdeb84f0434c76d095f0fb3228391

    • Size

      188KB

    • MD5

      e22fdeb84f0434c76d095f0fb3228391

    • SHA1

      19ed955bda6f287917d7c3308b561e466fe2b34a

    • SHA256

      1cf1310269493163b26652c6f7d71552f235e0702ee46fe2aed99334cffdf465

    • SHA512

      8abbbaed8b8adb433d09524735a7c3c7fea13ef41567886e78de2a1fc32c7c4baa483801847b0fb94662b8f966f8863b832957aba7f08f279ff4bb4ff90ca90b

    • SSDEEP

      3072:VA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAodo:VzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Matrix

Tasks