General

  • Target

    67b7f8fc1ca50eb2e1beee65b75ce8fb7d3d48716028eb581dd53c63ce1f4491

  • Size

    391KB

  • Sample

    240901-xm2xdszdkh

  • MD5

    f7e0dfc48168c9e14f77b838485b31e5

  • SHA1

    9f943f92316ecacf20d69dd13f260da9692074a3

  • SHA256

    67b7f8fc1ca50eb2e1beee65b75ce8fb7d3d48716028eb581dd53c63ce1f4491

  • SHA512

    462fb9c64b0a0f00f0e627db5651ea7595bd20f686072c1f1c3f5c6c3d29e3c55b1219cf00d643e2e157f684e90ee43ba7fe48009ecba1fc446bf5f03080b625

  • SSDEEP

    12288:Nb2hBVwQgj5Ov2AQtNeLeWguKnIfd2tSaVc26vwL+jNXT:NYVDGAQ3UeCK2dYSMc2o

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      cab5e2072573443e8e4047c7afb3856f501c62d8bc6578da915c2a4338cfa724

    • Size

      608KB

    • MD5

      ae02a764db8c2684bccad1ca79594ecc

    • SHA1

      4fa9703316c92a23f8c8662fe500108675902981

    • SHA256

      cab5e2072573443e8e4047c7afb3856f501c62d8bc6578da915c2a4338cfa724

    • SHA512

      3a81350511543d3acbe974c8118f8cf86404b04e322fd8f9a645f40c5ee4e76ef6860051f418cd894f4de97981f7f3317b52ad745a61f3043e4598b41336faff

    • SSDEEP

      12288:1ZGQdqOGxWJqydLqQSeCqsVK8kPRGO35N9mV2zXc6/:1Z00WjeCVVK8kP9N9oSt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks