General

  • Target

    13c94e1dadd128bbd14c961332f4755d04123b1cc6bc30698da22457f8624c19

  • Size

    161KB

  • Sample

    241221-wclxravlht

  • MD5

    31333ff364b18f31b5b8b4366ade5900

  • SHA1

    36b5445f6006d9eaca6af85712f6a03a9d8035dc

  • SHA256

    13c94e1dadd128bbd14c961332f4755d04123b1cc6bc30698da22457f8624c19

  • SHA512

    9a3eb32e0ca22061a7b91172f715cbe72e53ced53a59ce59ed00783133bfc76fb77d36d94989fcce083723078ee392e6d322c15739a15b049d4e44854c508228

  • SSDEEP

    3072:LR4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:mDBdOlG0nyg1DvwxgZ/v

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.55.134.126:443

67.207.83.96:8172

193.160.214.95:4125

rc4.plain
rc4.plain

Targets

    • Target

      13c94e1dadd128bbd14c961332f4755d04123b1cc6bc30698da22457f8624c19

    • Size

      161KB

    • MD5

      31333ff364b18f31b5b8b4366ade5900

    • SHA1

      36b5445f6006d9eaca6af85712f6a03a9d8035dc

    • SHA256

      13c94e1dadd128bbd14c961332f4755d04123b1cc6bc30698da22457f8624c19

    • SHA512

      9a3eb32e0ca22061a7b91172f715cbe72e53ced53a59ce59ed00783133bfc76fb77d36d94989fcce083723078ee392e6d322c15739a15b049d4e44854c508228

    • SSDEEP

      3072:LR4Dcp/qdOUKcT1GpvO0nygcp0DvA/fxHbeXaUDwOvHvWM:mDBdOlG0nyg1DvwxgZ/v

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks