General

  • Target

    50564a56e4499e0a7cd0c8e423d91acaa72037abba860d5b839f0af4df10114b.exe

  • Size

    664KB

  • Sample

    241122-jzkxrasrdl

  • MD5

    e39af37844e54808a9eae8c69d581fbf

  • SHA1

    534c5b9e542ac321e42da617204be633881a95dc

  • SHA256

    50564a56e4499e0a7cd0c8e423d91acaa72037abba860d5b839f0af4df10114b

  • SHA512

    e206f6e3c2b078fae196dfd6074eb46b3d4cb3e38346b960062f5642311b8096f1d0b7ce4c3e8079d6a8f9ebf07508d7be09dd392d556fd69239b4639d5436d9

  • SSDEEP

    12288:j/0Qzqf0eJi48WM+6TFKywVt6PbEYU0eyJTT/Mu9oV01uwoaEP+:70zhJpn6TFKywvCbEOxDMu9oycaEP+

Malware Config

Extracted

Family

dridex

Botnet

10222

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      50564a56e4499e0a7cd0c8e423d91acaa72037abba860d5b839f0af4df10114b.exe

    • Size

      664KB

    • MD5

      e39af37844e54808a9eae8c69d581fbf

    • SHA1

      534c5b9e542ac321e42da617204be633881a95dc

    • SHA256

      50564a56e4499e0a7cd0c8e423d91acaa72037abba860d5b839f0af4df10114b

    • SHA512

      e206f6e3c2b078fae196dfd6074eb46b3d4cb3e38346b960062f5642311b8096f1d0b7ce4c3e8079d6a8f9ebf07508d7be09dd392d556fd69239b4639d5436d9

    • SSDEEP

      12288:j/0Qzqf0eJi48WM+6TFKywVt6PbEYU0eyJTT/Mu9oV01uwoaEP+:70zhJpn6TFKywvCbEOxDMu9oycaEP+

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks