General

  • Target

    32d4013991d481311adf52247e819f21a1136ac5062a9b614a468c52eda8385d

  • Size

    161KB

  • Sample

    241221-tpde2aspfk

  • MD5

    53f0b9b12aab9e2089b43d54147a0d10

  • SHA1

    6952dcbf6863d5aa168aae5134042ff6f489dc5a

  • SHA256

    32d4013991d481311adf52247e819f21a1136ac5062a9b614a468c52eda8385d

  • SHA512

    3e5268aebf7317fe7044cc00f6b4e35884f42529667a24217f7159597070105f8013ffc42490c60e8c3ad8aab6aa64337368e60526fd55885b2841de82bd4993

  • SSDEEP

    3072:j1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2HGkFY:RnS62Fl+pkeJl3CvRStrFl+EYm

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

78.46.73.125:443

185.148.168.26:2303

66.113.160.126:8172

rc4.plain
rc4.plain

Targets

    • Target

      32d4013991d481311adf52247e819f21a1136ac5062a9b614a468c52eda8385d

    • Size

      161KB

    • MD5

      53f0b9b12aab9e2089b43d54147a0d10

    • SHA1

      6952dcbf6863d5aa168aae5134042ff6f489dc5a

    • SHA256

      32d4013991d481311adf52247e819f21a1136ac5062a9b614a468c52eda8385d

    • SHA512

      3e5268aebf7317fe7044cc00f6b4e35884f42529667a24217f7159597070105f8013ffc42490c60e8c3ad8aab6aa64337368e60526fd55885b2841de82bd4993

    • SSDEEP

      3072:j1Suywe6x1ACSZEuNtV+TkqDXkyzbMeJRL3CNa/U9fStrveyk8TZgEd2HGkFY:RnS62Fl+pkeJl3CvRStrFl+EYm

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks