General

  • Target

    8a341b70354ff136705c7c1f7edefcb834eb81d02ab26d2e149b7c391e28ff34

  • Size

    188KB

  • Sample

    241221-trpabasngx

  • MD5

    d14803a5a7ff4253a906e0312925c68f

  • SHA1

    71f6a9fdf92f6a488c72cd4c5fe12b08d54b7b23

  • SHA256

    8a341b70354ff136705c7c1f7edefcb834eb81d02ab26d2e149b7c391e28ff34

  • SHA512

    41a6e45c215d44e3ee069b16f2c1634617eab2a1d56daac5d2e201513a59e98863af6d146fbaff3c7e564ccb1ea75efc9277c2af2ef13a96f8b2cff25a0669fc

  • SSDEEP

    3072:MteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:wq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      8a341b70354ff136705c7c1f7edefcb834eb81d02ab26d2e149b7c391e28ff34

    • Size

      188KB

    • MD5

      d14803a5a7ff4253a906e0312925c68f

    • SHA1

      71f6a9fdf92f6a488c72cd4c5fe12b08d54b7b23

    • SHA256

      8a341b70354ff136705c7c1f7edefcb834eb81d02ab26d2e149b7c391e28ff34

    • SHA512

      41a6e45c215d44e3ee069b16f2c1634617eab2a1d56daac5d2e201513a59e98863af6d146fbaff3c7e564ccb1ea75efc9277c2af2ef13a96f8b2cff25a0669fc

    • SSDEEP

      3072:MteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzY9qM:wq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks