General

  • Target

    de9da45b851f72726f773af9cf5d9ea4d1bdbb11164e277373f4f7e8ec462067N

  • Size

    184KB

  • Sample

    241026-aj5sjsxgrk

  • MD5

    2063ef933532435c38914627d5215d90

  • SHA1

    c26a409500bc79421b1401e405fc20a8ea6a1d52

  • SHA256

    de9da45b851f72726f773af9cf5d9ea4d1bdbb11164e277373f4f7e8ec462067

  • SHA512

    12b35e130cfc786033a41f5fde053fe1eab98313c0b9f421b050bdbde8a6f005d39a8fa0d0defc75f420fbf7f9503fd5c4ee4417205c7c1945efce10d50ccbde

  • SSDEEP

    3072:792qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTGrLA:79NSMOEpQ1Q3ODAr+VK

Malware Config

Extracted

Family

dridex

Botnet

22203

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      de9da45b851f72726f773af9cf5d9ea4d1bdbb11164e277373f4f7e8ec462067N

    • Size

      184KB

    • MD5

      2063ef933532435c38914627d5215d90

    • SHA1

      c26a409500bc79421b1401e405fc20a8ea6a1d52

    • SHA256

      de9da45b851f72726f773af9cf5d9ea4d1bdbb11164e277373f4f7e8ec462067

    • SHA512

      12b35e130cfc786033a41f5fde053fe1eab98313c0b9f421b050bdbde8a6f005d39a8fa0d0defc75f420fbf7f9503fd5c4ee4417205c7c1945efce10d50ccbde

    • SSDEEP

      3072:792qSmHOhnWpPI1ybmJIiC00PArIojHTYVBCn+rs3Ss3qLMTGrLA:79NSMOEpQ1Q3ODAr+VK

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks