General

  • Target

    e594ea701d1147da0c765e715acfecf0N

  • Size

    236KB

  • Sample

    240911-g7vqtaxeph

  • MD5

    e594ea701d1147da0c765e715acfecf0

  • SHA1

    0d0ce2f2496925a1decfc0c94faa0cf547408b86

  • SHA256

    e7f53e5e1724d90b85d4d51c13eaf10d163573d3b74f470c8f10f483a121e4c4

  • SHA512

    5b245d758ebf4e02346f742f78b8b52b570267b3bca0eb6461024523a6599ac136c81cc185ed16d7866e8b62aeb946d690ae4d59bc6cfe276ae1216895cdf612

  • SSDEEP

    6144:04V3yyQTz8ITeRDZSw3D2Fsd1u/6mv5/dC:0ciyQTdT+swTgt/6c/dC

Malware Config

Extracted

Family

dridex

Botnet

111

C2

77.220.64.40:443

8.4.9.152:3786

185.246.87.202:3098

rc4.plain
rc4.plain

Targets

    • Target

      e594ea701d1147da0c765e715acfecf0N

    • Size

      236KB

    • MD5

      e594ea701d1147da0c765e715acfecf0

    • SHA1

      0d0ce2f2496925a1decfc0c94faa0cf547408b86

    • SHA256

      e7f53e5e1724d90b85d4d51c13eaf10d163573d3b74f470c8f10f483a121e4c4

    • SHA512

      5b245d758ebf4e02346f742f78b8b52b570267b3bca0eb6461024523a6599ac136c81cc185ed16d7866e8b62aeb946d690ae4d59bc6cfe276ae1216895cdf612

    • SSDEEP

      6144:04V3yyQTz8ITeRDZSw3D2Fsd1u/6mv5/dC:0ciyQTdT+swTgt/6c/dC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks