General

  • Target

    1dc3b532af834ca5c77d2bde716661b149479ba1ff7c25d612c8263d8bd7f70a.exe

  • Size

    180KB

  • Sample

    241123-re2zjasnbj

  • MD5

    a8b1f9039bf2a6242c4947e65000e0fc

  • SHA1

    3a6f0ceb22206183ebc7201587a2b7eb6ee8bd2d

  • SHA256

    1dc3b532af834ca5c77d2bde716661b149479ba1ff7c25d612c8263d8bd7f70a

  • SHA512

    d56fd39f609a498b638b6e42342d8a2ea42b877529dce4030ce7d0871d2205975ba7bbc752afab186ef25f0f9459610594d6b6e8bf89bd4a3ccc2ecb4bea4b2d

  • SSDEEP

    3072:BGp0m9FOGDv64TOvqdjR91E404PUW6bKHJZK0Bzb5Hea3:BGp0bG6q7040aBfK0db5L

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

212.237.17.99:443

176.28.17.160:6602

51.254.140.238:8333

rc4.plain
rc4.plain

Targets

    • Target

      1dc3b532af834ca5c77d2bde716661b149479ba1ff7c25d612c8263d8bd7f70a.exe

    • Size

      180KB

    • MD5

      a8b1f9039bf2a6242c4947e65000e0fc

    • SHA1

      3a6f0ceb22206183ebc7201587a2b7eb6ee8bd2d

    • SHA256

      1dc3b532af834ca5c77d2bde716661b149479ba1ff7c25d612c8263d8bd7f70a

    • SHA512

      d56fd39f609a498b638b6e42342d8a2ea42b877529dce4030ce7d0871d2205975ba7bbc752afab186ef25f0f9459610594d6b6e8bf89bd4a3ccc2ecb4bea4b2d

    • SSDEEP

      3072:BGp0m9FOGDv64TOvqdjR91E404PUW6bKHJZK0Bzb5Hea3:BGp0bG6q7040aBfK0db5L

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks