General

  • Target

    62c1e2280d12687b051d3dcfa4d85f2502460c6a8f3d8e2f09150ef15cb123e0

  • Size

    188KB

  • Sample

    241221-tp4bfssphl

  • MD5

    c574ad13b3d644561eafd33c95ab3d6d

  • SHA1

    58c1df39453b29fd84ded68cb97007e27210e050

  • SHA256

    62c1e2280d12687b051d3dcfa4d85f2502460c6a8f3d8e2f09150ef15cb123e0

  • SHA512

    0af44977453b766a06f36e59581448d3f45da12900cc100052f07c34519194012612adaf2b50d593a02a71ce66c825d32c1e0b87c6460cf8d9f16f592032765d

  • SSDEEP

    3072:eteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:Wq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      62c1e2280d12687b051d3dcfa4d85f2502460c6a8f3d8e2f09150ef15cb123e0

    • Size

      188KB

    • MD5

      c574ad13b3d644561eafd33c95ab3d6d

    • SHA1

      58c1df39453b29fd84ded68cb97007e27210e050

    • SHA256

      62c1e2280d12687b051d3dcfa4d85f2502460c6a8f3d8e2f09150ef15cb123e0

    • SHA512

      0af44977453b766a06f36e59581448d3f45da12900cc100052f07c34519194012612adaf2b50d593a02a71ce66c825d32c1e0b87c6460cf8d9f16f592032765d

    • SSDEEP

      3072:eteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIz49qM:Wq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks