General

  • Target

    3b696f83f56dc0760bf21d8f625f9dc886f8552f9dae03583655dcba2b97ed14N

  • Size

    184KB

  • Sample

    241107-t9tyhswcnr

  • MD5

    6b09745a46857be33291389d67c42b40

  • SHA1

    38d51a01ce7eaf44bc34fe3f2535e8b8d5a0f2e8

  • SHA256

    3b696f83f56dc0760bf21d8f625f9dc886f8552f9dae03583655dcba2b97ed14

  • SHA512

    135d8222098d08a9c825c704aacc1d94de9c0b2b6dbbfb185fb401b28b656267216f28ba0df1d121d1a7058edd58517b16b4ead5426b3b5303a6a580d68e61f8

  • SSDEEP

    3072:vJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jga//2uFrSc:8fYOX+wTScR/Xzku9LVwbuG

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      3b696f83f56dc0760bf21d8f625f9dc886f8552f9dae03583655dcba2b97ed14N

    • Size

      184KB

    • MD5

      6b09745a46857be33291389d67c42b40

    • SHA1

      38d51a01ce7eaf44bc34fe3f2535e8b8d5a0f2e8

    • SHA256

      3b696f83f56dc0760bf21d8f625f9dc886f8552f9dae03583655dcba2b97ed14

    • SHA512

      135d8222098d08a9c825c704aacc1d94de9c0b2b6dbbfb185fb401b28b656267216f28ba0df1d121d1a7058edd58517b16b4ead5426b3b5303a6a580d68e61f8

    • SSDEEP

      3072:vJQ6H3ykY88YOSs+k1TwEuTcMIznNuOzlr1Xznku9Luk0eJww8Jga//2uFrSc:8fYOX+wTScR/Xzku9LVwbuG

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks