General

  • Target

    dd7b140527c19a4d7dd199e2fbb504047f2ce5a1b33b98b6d9ec1e28e2b778c8

  • Size

    423KB

  • Sample

    240830-3d7deascme

  • MD5

    616997b60ae9289f6a4aec9aa2708ed0

  • SHA1

    f5cc6935bb4d813eafd463b4abcb29ee390a5ae4

  • SHA256

    dd7b140527c19a4d7dd199e2fbb504047f2ce5a1b33b98b6d9ec1e28e2b778c8

  • SHA512

    e5fc83db44978d996b57285a8913d69e0135741be0b3a412d12b0b7f652a98cb847325067912f326ccd8199100d2f4fa12a4bb19bf6d7fcc26cabe95329d7108

  • SSDEEP

    12288:G78u3oEdurrIIPuzRCqNzVffcEwDcoBh8e:G78uYEcXvPqNl0Db

Malware Config

Extracted

Family

dridex

Botnet

10222

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      9594577308c87de7eabcf43d26efc638a2047f2e78985e7dde17287317d4cfaf

    • Size

      664KB

    • MD5

      22cdafaa93390d4fe9b9e1a4d87267a4

    • SHA1

      5a4e352b18bdbe9c94f45417d8796d64442e6413

    • SHA256

      9594577308c87de7eabcf43d26efc638a2047f2e78985e7dde17287317d4cfaf

    • SHA512

      62bac44c033ab6d0263bc3ae55587daf7e7e242885ce5c78bd49a578acd2a3a2004641da603793a07f2443dfc5981c3b6b4ba0f7c3ee8db4824b0eb3237fc9f1

    • SSDEEP

      12288:X/0Qzqf0efi48bM+6TFKywVt6PbEYU0eyJTT/Mu9oV01u7oaEPj:P0zhfkn6TFKywvCbEOxDMu9oy9aEPj

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks