General

  • Target

    4d6b653713e56ba9dea7d796531f08c9c11baaed620a8e403a1be407c72c8709

  • Size

    188KB

  • Sample

    240929-mcrnkatard

  • MD5

    60cd67741c934bd59e7470048ec9bd70

  • SHA1

    4d40817b6719c81c19f126f2fb23cef9d45c1bef

  • SHA256

    4d6b653713e56ba9dea7d796531f08c9c11baaed620a8e403a1be407c72c8709

  • SHA512

    ce6c2bddfa85bf34f406888c50f6983085fec3644fc2a5b7174ebd18e22ea02a6434e6f48415aea1b75af60a4ba5cdc568982c1fd321844aa8fb01ed51cdca0b

  • SSDEEP

    3072:LWa3N1eqJ7cNe58per6JpynepWHVD9qMe402JYIUk9H8Iz83SW49klSC:dxwO/Spynep6VDcMeQeIUk9cI6Q5

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

134.209.182.12:443

188.40.100.254:4664

103.109.247.9:10443

rc4.plain
rc4.plain

Targets

    • Target

      4d6b653713e56ba9dea7d796531f08c9c11baaed620a8e403a1be407c72c8709

    • Size

      188KB

    • MD5

      60cd67741c934bd59e7470048ec9bd70

    • SHA1

      4d40817b6719c81c19f126f2fb23cef9d45c1bef

    • SHA256

      4d6b653713e56ba9dea7d796531f08c9c11baaed620a8e403a1be407c72c8709

    • SHA512

      ce6c2bddfa85bf34f406888c50f6983085fec3644fc2a5b7174ebd18e22ea02a6434e6f48415aea1b75af60a4ba5cdc568982c1fd321844aa8fb01ed51cdca0b

    • SSDEEP

      3072:LWa3N1eqJ7cNe58per6JpynepWHVD9qMe402JYIUk9H8Iz83SW49klSC:dxwO/Spynep6VDcMeQeIUk9cI6Q5

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks