General

  • Target

    4b98a9b5c5037bea56231d6ab71d3bff701cfcbc415719cb8f51970949771e8c

  • Size

    188KB

  • Sample

    241221-tmxe5aspbr

  • MD5

    f2f975266f3ffa3250584e721a855beb

  • SHA1

    7eed89ce29278fb97f2c98549de0811c8e4cde2d

  • SHA256

    4b98a9b5c5037bea56231d6ab71d3bff701cfcbc415719cb8f51970949771e8c

  • SHA512

    2a57f9a386779e8eab8c028fa14c7141c734da4781a70a1479a33dd6f3ab95945d14839c73cc83f5674f26f19835a0792d545b57fa58ebdcba549ac37c405b3a

  • SSDEEP

    3072:gA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAofo:gzIqATVfQeV2FZalKq6jtGJWuTmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.82.248.59:443

54.39.98.141:6602

103.109.247.8:10443

rc4.plain
rc4.plain

Targets

    • Target

      4b98a9b5c5037bea56231d6ab71d3bff701cfcbc415719cb8f51970949771e8c

    • Size

      188KB

    • MD5

      f2f975266f3ffa3250584e721a855beb

    • SHA1

      7eed89ce29278fb97f2c98549de0811c8e4cde2d

    • SHA256

      4b98a9b5c5037bea56231d6ab71d3bff701cfcbc415719cb8f51970949771e8c

    • SHA512

      2a57f9a386779e8eab8c028fa14c7141c734da4781a70a1479a33dd6f3ab95945d14839c73cc83f5674f26f19835a0792d545b57fa58ebdcba549ac37c405b3a

    • SSDEEP

      3072:gA8JmK7ATVfQeVqNFZa/9KzMXJ6jTFDlAwqWut5KZMzfeAAAofo:gzIqATVfQeV2FZalKq6jtGJWuTmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks