General

  • Target

    2d15c17347c640cf0638c2ddc14e3ebb99a5281f01a1252614289eba2c708f51.exe

  • Size

    608KB

  • Sample

    241123-vzvmqsvmhk

  • MD5

    6a92f0c3d568e681e867f5e1b7c7df05

  • SHA1

    8bf33e38f4d010df336e16d424ae80c478ad5eee

  • SHA256

    2d15c17347c640cf0638c2ddc14e3ebb99a5281f01a1252614289eba2c708f51

  • SHA512

    66de4fe8cc2962a0030bf7ad9724e3659555e06ba5ceeeeffd3393dabb195a103bd915ff9db5e983fb85d96166d85ebb55774c1d26c9d7e1833c65f974089d4d

  • SSDEEP

    12288:CZGQdqOGMnJqydLqQSeCqsVK8kPRGO35N9mVHzXc64:CZ0mWjeCVVK8kP9N9oTi

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

174.128.245.202:443

51.83.3.52:13786

69.64.50.41:6602

rc4.plain
rc4.plain

Targets

    • Target

      2d15c17347c640cf0638c2ddc14e3ebb99a5281f01a1252614289eba2c708f51.exe

    • Size

      608KB

    • MD5

      6a92f0c3d568e681e867f5e1b7c7df05

    • SHA1

      8bf33e38f4d010df336e16d424ae80c478ad5eee

    • SHA256

      2d15c17347c640cf0638c2ddc14e3ebb99a5281f01a1252614289eba2c708f51

    • SHA512

      66de4fe8cc2962a0030bf7ad9724e3659555e06ba5ceeeeffd3393dabb195a103bd915ff9db5e983fb85d96166d85ebb55774c1d26c9d7e1833c65f974089d4d

    • SSDEEP

      12288:CZGQdqOGMnJqydLqQSeCqsVK8kPRGO35N9mVHzXc64:CZ0mWjeCVVK8kP9N9oTi

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks