General

  • Target

    02484fd7226d433917d4b5d9c501dcf08c100170ee731e70fe72b6139b747baeN.exe

  • Size

    738KB

  • Sample

    241219-clsbcatjfn

  • MD5

    c7d0b6e721f61f7b375349d5ae1c9440

  • SHA1

    7c0041018f140cd3ad6b89a33467c2908a29c13d

  • SHA256

    02484fd7226d433917d4b5d9c501dcf08c100170ee731e70fe72b6139b747bae

  • SHA512

    dd8c8d33c469a38e51ca9bb1af533dd51214845340706656b568d8c5eefe3c36fe3549bbc30e510e45b4dc3e9dcc2b04733fddee5fae5b75e6a2b7cf6e6f10a1

  • SSDEEP

    12288:KAxp7ZGGOE7E1yPxzurnfvAhsec81X8U8tnx:KmtZl9wQRurnXg/L1MU8b

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

5.9.178.143:443

185.230.161.62:3389

2.58.16.89:8443

rc4.plain
rc4.plain

Targets

    • Target

      02484fd7226d433917d4b5d9c501dcf08c100170ee731e70fe72b6139b747baeN.exe

    • Size

      738KB

    • MD5

      c7d0b6e721f61f7b375349d5ae1c9440

    • SHA1

      7c0041018f140cd3ad6b89a33467c2908a29c13d

    • SHA256

      02484fd7226d433917d4b5d9c501dcf08c100170ee731e70fe72b6139b747bae

    • SHA512

      dd8c8d33c469a38e51ca9bb1af533dd51214845340706656b568d8c5eefe3c36fe3549bbc30e510e45b4dc3e9dcc2b04733fddee5fae5b75e6a2b7cf6e6f10a1

    • SSDEEP

      12288:KAxp7ZGGOE7E1yPxzurnfvAhsec81X8U8tnx:KmtZl9wQRurnXg/L1MU8b

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader 'dmod' strings

      Detects 'dmod' strings in Dridex loader.

MITRE ATT&CK Enterprise v15

Tasks