General

  • Target

    00995874f5c61a305adfd117d5ccc980891d6a1afb5eb2fe5e0f6ed869ddfb7e.exe

  • Size

    154KB

  • Sample

    241230-ywa1pswqam

  • MD5

    983ba9c89dad996fa4168cd8b38c6732

  • SHA1

    98a090dad6fb7483ecaba5df84afff3303c3774a

  • SHA256

    00995874f5c61a305adfd117d5ccc980891d6a1afb5eb2fe5e0f6ed869ddfb7e

  • SHA512

    0e1a8b8bec2099a3ea7d774b25e683766ba8a6727f16288bc14e28a77cd4e6baa3c62ddf63a1a29abf2b2db9210898eeb5986d56be6744d9f8819091e9f109c3

  • SSDEEP

    3072:vZ+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBCm:eQeVf/2gUU76rDeIgESXZmYYa1

Malware Config

Extracted

Family

dridex

Botnet

40111

C2

159.8.59.82:443

51.91.156.39:2303

67.196.50.240:8172

rc4.plain
rc4.plain

Targets

    • Target

      00995874f5c61a305adfd117d5ccc980891d6a1afb5eb2fe5e0f6ed869ddfb7e.exe

    • Size

      154KB

    • MD5

      983ba9c89dad996fa4168cd8b38c6732

    • SHA1

      98a090dad6fb7483ecaba5df84afff3303c3774a

    • SHA256

      00995874f5c61a305adfd117d5ccc980891d6a1afb5eb2fe5e0f6ed869ddfb7e

    • SHA512

      0e1a8b8bec2099a3ea7d774b25e683766ba8a6727f16288bc14e28a77cd4e6baa3c62ddf63a1a29abf2b2db9210898eeb5986d56be6744d9f8819091e9f109c3

    • SSDEEP

      3072:vZ+9Q25AHEf/2gUU7uZAOCIB0IgESXZyX/sS5eqLrNWBCm:eQeVf/2gUU76rDeIgESXZmYYa1

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks