General

  • Target

    8991a923b545af6df7a8584e27c7644443453bd65f161f74a9dc13f843aa46e8

  • Size

    391KB

  • Sample

    240831-ghlfvaydrn

  • MD5

    f488d26fc98bc923ee87d8511d24eff9

  • SHA1

    b3e7f65fe57f9b29963ca28c696ed87bd9435f84

  • SHA256

    8991a923b545af6df7a8584e27c7644443453bd65f161f74a9dc13f843aa46e8

  • SHA512

    e8021ec90c824f81ff149e382aad767625f5c39727c1ff78398770dd4d492e4657c88dcbfe82c825eb306a29a668de97823b95b334606d1d1e6e327be69b9082

  • SSDEEP

    6144:Upoa3AqKXBoq2dtiZhaKttE0HAGkTG7hDgrEx09g5FJZV71spHHVflQ9O5dwgQIc:UpoayraKttTgrTGVpqg5rDeH1OVgQ

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      a41013aa5b103e8db7d3afb55358ba2a822358a32fa2c35cda53e577b7cf875f

    • Size

      608KB

    • MD5

      6511df1bc36a005dde9aeca27924c065

    • SHA1

      ba4b1e0ac9a1629d707b5cfdb9403c69edf9a1cd

    • SHA256

      a41013aa5b103e8db7d3afb55358ba2a822358a32fa2c35cda53e577b7cf875f

    • SHA512

      4752afda68fbdfa6d0c728ccc979576d80e72c6021839d927d84c26a16cfaa8a3bdb0230034fc31770baa47499b5ddf93da95f88a3a6ce8cdcd0f1ec03d4084e

    • SSDEEP

      12288:NZGQdqOGBLJqydLqQSeCqsVK8kPRGO35N9mVTzXc6:NZ0VWjeCVVK8kP9N9oX

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks