General

  • Target

    27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6.exe

  • Size

    170KB

  • Sample

    250101-sy2zbasrgp

  • MD5

    1cb656c7ac7e08e5d50248ca7ee78a98

  • SHA1

    aca2746215df07e753a2c8a3fe0eeac74873c1b3

  • SHA256

    27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6

  • SHA512

    032fb03ec05161cd28bf3cf2162976ccf6014e0cda0904f5115cc12d3402d2d79ef6ea7c6aa9bc782428f13a74714c1cde331cccfedef23d741392aa093dedf2

  • SSDEEP

    3072:rV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erjy:rV/jTe38LiI4Oi75izyn+4lmd

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

210.65.244.187:443

162.241.41.92:2303

46.231.204.10:8172

185.183.159.100:4125

rc4.plain
rc4.plain

Targets

    • Target

      27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6.exe

    • Size

      170KB

    • MD5

      1cb656c7ac7e08e5d50248ca7ee78a98

    • SHA1

      aca2746215df07e753a2c8a3fe0eeac74873c1b3

    • SHA256

      27d56ac8d2507dad368f3c3b0b1dc8665fd7ca16d3a343ff59f310c309a90dd6

    • SHA512

      032fb03ec05161cd28bf3cf2162976ccf6014e0cda0904f5115cc12d3402d2d79ef6ea7c6aa9bc782428f13a74714c1cde331cccfedef23d741392aa093dedf2

    • SSDEEP

      3072:rV/jTmL3X6TLhgZBxbvRS1ebSi75S5NNZ4n+whXVM9MWdo8erjy:rV/jTe38LiI4Oi75izyn+4lmd

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks