General

  • Target

    e413f3a91ad86c1d165b54ada721c5ab.zip

  • Size

    391KB

  • Sample

    240831-pelw7ssfke

  • MD5

    9669bc92217356f1945122bbc5eb3128

  • SHA1

    cfd72eb8a75a057051927427d0ae8bf620620fcc

  • SHA256

    f20b962ab7df33e3fcc57962372ffdb8daa1cfeca5a1cf568f7b5d294b2b3a13

  • SHA512

    e26d6f6d44e366fd747e028acd037a11f1c972cd9b239f2d470eb3f56daa794fd3f6523f31be4fb687280d2ee162741e80f4b48173e86ef7e35e5775a9558929

  • SSDEEP

    12288:V5FITWQ8I4eBlI6uZta7PoALBnmWWDv/eqPk2KFh:V5FItBqHYrtmWue+BKv

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      4f2ac8c6a5eec50e093c9fe14e2597b691a6a0eda9867e17cd2fa17aba1e8a75

    • Size

      608KB

    • MD5

      e413f3a91ad86c1d165b54ada721c5ab

    • SHA1

      55ef7747b281eb556b72d7c75619884dba01a51c

    • SHA256

      4f2ac8c6a5eec50e093c9fe14e2597b691a6a0eda9867e17cd2fa17aba1e8a75

    • SHA512

      003187ad0039284c43451db8c538da5974b6e4e950eb136ad4bc5ff78edf9cc1ad9700aa6f259f5d760b6db3183ceabb89082a10f2a0e101358a78fc67873d39

    • SSDEEP

      12288:sZGQdqOGH3JqydLqQSeCqsVK8kPRGO35N9mVjzXc6:sZ0fWjeCVVK8kP9N9on

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks